<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CERT Newsletter - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/category/formats-en/cert-newsletter/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/category/formats-en/cert-newsletter/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 03 May 2023 10:03:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>CERT Newsletter - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/category/formats-en/cert-newsletter/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CYB Watch – April 2023</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/05/cyb-watch-april-2023/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/05/cyb-watch-april-2023/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 02 May 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[ESXi attacks]]></category>
		<category><![CDATA[Qakbot]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20389</guid>

					<description><![CDATA[<p>Here are the topics of this newsletter edition: A well-known bot often used for cyber-attacks, the Qakbot The First responder Word FOCUS TECH QAKBOT Initially designed to steal banking credentials, Qakbot has evolved into a more versatile malware with multiple...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/05/cyb-watch-april-2023/">CYB Watch – April 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Here are the topics of this newsletter edition:</p>
<ul>
<li>A well-known bot often used for cyber-attacks, the <span style="color: #800080;"><strong>Qakbot</strong></span></li>
<li>The <span style="color: #800080;"><strong>First responder Word</strong></span></li>
</ul>
<h2 style="text-align: center;">FOCUS TECH</h2>
<h3 style="text-align: center;">QAKBOT</h3>
<p style="text-align: justify;">Initially designed to <span style="color: #800080;"><strong>steal banking</strong></span> credentials, Qakbot has evolved into a more<span style="color: #800080;"> <strong>versatile malware with multiple uses </strong></span>like stealing data or using it as a trojan to enter within an IT system. Besides, it is highly modulable, which allows actor to add new functionalities easily. Over time, its <span style="color: #800080;"><strong>capabilities</strong></span> have <span style="color: #800080;"><strong>expanded</strong></span> to target various types of sensitive information. This <span style="color: #800080;"><strong>increasingly widespread threat</strong> </span>now affects a broader range of victims and industries, especially in European countries, and is used by well-known actors such as black basta ransomware group.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-20391" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture1.png" alt="" width="1576" height="984" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture1.png 1576w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture1-306x191.png 306w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture1-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture1-768x480.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture1-1536x959.png 1536w" sizes="(max-width: 1576px) 100vw, 1576px" /></p>
<p style="text-align: justify;">To <span style="color: #800080;"><strong>protect against Qakbot</strong></span>, it&#8217;s important to take a proactive approach to security. Implementing <strong><span style="color: #800080;">various</span> <span style="color: #800080;">measures</span></strong> can help defend against this threat:</p>
<ul>
<li style="text-align: justify;">Consider <span style="color: #800080;"><strong>utilizing an EDR system</strong></span> within your organization to ensure constant monitoring and prompt responses to cyberattacks</li>
<li style="text-align: justify;">Monitor <span style="color: #800080;"><strong>IoCs</strong></span>, verify child processes with <span style="color: #800080;"><strong>Sigma rules</strong></span> and restrict admin access</li>
<li style="text-align: justify;">Train users to <span style="color: #800080;"><strong>recognize phishing emails</strong></span> and <span style="color: #800080;"><strong>avoid clicking on suspicious links</strong></span> or opening attachments from unknown senders, as it is a common infection way. It is also recommended to train on<span style="color: #800080;"> <strong>specific personalized modules</strong> </span>as the phishing techniques get more and more sophisticated</li>
<li style="text-align: justify;">Implement <span style="color: #800080;"><strong>strong, unique passwords</strong></span> for all accounts, and use <span style="color: #800080;"><strong>MFA</strong> </span>for all privileged accesses (mail, VPN, cloud…)</li>
<li style="text-align: justify;"><span style="color: #800080;"><strong>Regularly update operating systems</strong> </span>and software to patch vulnerabilities that could be exploited by Qakbot to spread from a post to another for example.</li>
</ul>
<p>While no single solution can guarantee complete protection from Qakbot, <span style="color: #800080;"><strong style="font-size: revert;">combining these strategies</strong></span><span style="font-size: revert; color: initial;"> will significantly </span><span style="color: #800080;"><strong style="font-size: revert;">reduce the risk of infection</strong></span><span style="font-size: revert; color: initial;"> and help maintain a </span><strong style="font-size: revert; color: initial;"><span style="color: #800080;">secure environment</span></strong>.</p>
<p> </p>
<h2 style="text-align: center;">CERT-W: FROM THE FRONT LINE</h2>
<h3 style="text-align: center;">THE FIRST RESPONDER WORD</h3>
<p><img decoding="async" class="aligncenter size-full wp-image-20393" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture2.png" alt="" width="1538" height="976" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture2.png 1538w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture2-301x191.png 301w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture2-61x39.png 61w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture2-768x487.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/05/Picture2-1536x975.png 1536w" sizes="(max-width: 1538px) 100vw, 1538px" /></p>



<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/05/cyb-watch-april-2023/">CYB Watch – April 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/05/cyb-watch-april-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – March 2023</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 24 Mar 2023 15:08:27 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20080</guid>

					<description><![CDATA[<p>An overview of the different cybercriminal uses case of ChatGPT The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU CHATGPT What opportunities for the underground world of cybercrime ?   Need a refresh about...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/">CDT Watch – March 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<ul>
<li>An overview of the different cybercriminal uses case of ChatGPT</li>
<li>The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU</li>
</ul>
<h1 style="text-align: center;">CHATGPT</h1>
<h2 style="text-align: center;">What opportunities for the underground world of cybercrime ?</h2>
<h2> </h2>
<h2 style="text-align: left;"><strong>Need a refresh about ChatGPT?</strong></h2>
<p style="text-align: justify;"><img decoding="async" class="aligncenter wp-image-20082 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1.png" alt="" width="1129" height="231" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1.png 1129w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-437x89.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-768x157.png 768w" sizes="(max-width: 1129px) 100vw, 1129px" /></p>
<p style="text-align: center;"><em>Figure 1 &#8211; Screenshot from ChatGPT when prompted &#8220;Introduce ChatGPT in a funny way and at the first person&#8221;</em></p>
<p> </p>
<p style="text-align: justify;">Unless living under a rock, you have heard about the incredibly notorious <span style="color: #503078;"><strong>AI powered chatbot</strong> </span>developed by OpenAI: Chat GPT, a tool that relies on the Generative Pre-trained Transformer architecture. But just in case, you must know that ChatGPT has been trained on a <span style="color: #503078;"><strong>vast amount of data from the Internet</strong> </span>and is able to <span style="color: #503078;"><strong>understand human speech</strong></span> and <span style="color: #503078;"><strong>interact</strong> </span>with users. Chat GPT has not finished to be talked about: on March 14<sup>th</sup> 2023, Open AI has announced the <strong><span style="color: #503078;">arrival of Chat GPT 4.0</span><a href="#_edn1" name="_ednref1">[i]</a></strong>.</p>
<p style="text-align: justify;">The growing popularity and potential future applications of ChatGPT have also caught the attention of cybercriminals. Nord VPN&#8217;s examination of Dark Web posts from January 13th to February 13th revealed a significant increase in Darkweb forum threads discussing ChatGPT, <span style="color: #503078;"><strong>jumping from 37 to 91 in just a month</strong></span>. The main topics of these threads included:</p>
<ul style="text-align: justify;">
<li>Breaking ChatGPT</li>
<li>Using ChatGPT to create Dark Web Marketplace scripts</li>
<li>A new ChatGPT Trojan Binder</li>
<li>ChatGPT as a phishing tool with answers indistinguishable from humans</li>
<li>ChatGPT trojan</li>
<li>ChatGPT jailbreak 2.0</li>
<li>Progression of ChatGPT malware</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20084 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2.jpg" alt="" width="245" height="230" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2.jpg 245w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-203x191.jpg 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-42x39.jpg 42w" sizes="auto, (max-width: 245px) 100vw, 245px" /></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Screenshot from CheckPoint: Cybercriminal is using ChatGPT to improve Infostealer’s code</em></p>
<p> </p>
<p style="text-align: justify;">These threads give a first <span style="color: #503000;"><strong><span style="color: #503078;">interesting overview of all the rogue usage that can involves ChatGPT or be carried out via the chatbot</span>.</strong></span> Another key security concern could also be included in this list when thinking about ChatGPT’s limitations in terms of cybersecurity, which is the risk of personal and/or corporate data leak, that could lead to identity theft, fraud, or other malicious uses.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>What are the plausible cybercriminal use cases?</strong></h2>
<p style="text-align: justify;"><strong><em> <img loading="lazy" decoding="async" class="aligncenter wp-image-20086 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1.png" alt="" width="883" height="468" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1.png 883w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-768x407.png 768w" sizes="auto, (max-width: 883px) 100vw, 883px" /></em></strong></p>
<p style="text-align: center;"><strong><em> </em></strong><em>Figure 3 &#8211; Screenshot of a ChatGPT answer when prompted “Talk at the first person about possible cybercriminal usage of ChatGPT”</em></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Use Case #1 – Support malware creation and kill chain attack</strong></h3>
<p style="text-align: justify;">ChatGPT is designed to decline inappropriate requests but there are ways to bypass its restrictions and generate malicious code. For example, instead of directly requesting a ransomware script, users can describe step-by-step functions needed for such a script, ultimately receiving functional parts of malicious code.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20088 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2.png" alt="" width="569" height="460" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2.png 569w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2-236x191.png 236w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2-48x39.png 48w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p style="text-align: center;"><em>Figure 4 – Screenshot of a ChatGPT answer to the request “Write me a function named &#8220;find_files&#8221; in Python that searches all files that end up with &#8220;txt, pdf, docx, ppt, xlsm&#8221; starting from the root directory and that return all paths of files that match with the criteria”.</em></p>
<p> </p>
<p style="text-align: justify;">It has been proven possible to use ChatGPT to insert harmful code into a commonly used <a href="https://www.cyberark.com/resources/threat-research-blog/chatting-our-way-into-creating-a-polymorphic-malware">computer program and create programs that constantly change their appearance</a>, making them harder for security software to detect and block and to obtain an <a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/">entire process of an artificial intelligence-driven cyberattack</a>, starting with targeted phishing emails and ending with gaining unauthorized access to someone&#8217;s computer.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20090 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5.png" alt="" width="569" height="440" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5.png 569w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-247x191.png 247w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-50x39.png 50w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p style="text-align: center;"><em>Figure 5 &#8211; Screenshot from CheckPoint: Example of the ability to create a malware code without anti-abuse restrictions in a Telegram bot utilizing the OpenAI API</em></p>
<p> </p>
<p style="text-align: justify;">However, as highlighted by <a href="https://www.ncsc.gov.uk/blog-post/chatgpt-and-large-language-models-whats-the-risk">NCSC</a> and <a href="https://www.kaspersky.fr/blog/chatgpt-cybersecurity/20052/">Kaspersky</a>, <span style="color: #503078;"><strong>using ChatGPT</strong></span> for creating malware is not that reliable, due to potential errors and logical loopholes in the generated code, and even if it provides a certain level of support, <span style="color: #503078;"><strong>the tool doesn’t currently reach the level of cyber professional.</strong></span></p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;"><strong>Use Case #2 – Discover and exploit vulnerabilities</strong></h3>
<p style="text-align: justify;">When it comes to code vulnerabilities, ChatGPT raises several challenges in terms of detection and exploitation.</p>
<p style="text-align: justify;">In terms of <span style="color: #503078;"><strong>detection</strong></span>, ChatGPT is currently able to detect vulnerabilities in any piece of code submitted if properly prompted to do so, but it can also debug code. For example, when a computer security researcher asked ChatGPT to solve a capture-the-flag challenge, it successfully detected a buffer overflow vulnerability and wrote code to exploit it, with only a minor error that was later corrected.</p>
<p style="text-align: justify;">In terms of <span style="color: #503078;"><strong>exploitation</strong></span>, the risks posed by ChatGPT, and more generally Large Language Models (LLMs) can be used to produce malicious code or exploits despite restrictions, as they can be bypassed. Additionally, LLMs may generate vulnerable and misaligned code, and while future models will be trained to produce more secure code, it&#8217;s not the case yet. Moreover, some security researchers remain skeptical about AI&#8217;s ability to create modern exploits that require new techniques.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #3 – Create persuasive content for phishing and scam operations</strong></h3>
<p style="text-align: justify;">Creating persuasive text is a major strength of GPT-3.5/ChatGPT, and GPT-4 performs even better in this area. Consequently, it&#8217;s highly probable that automated spear phishing attacks using chatbots already exist. Crafting targeted phishing messages for individual victims is more resource-intensive, which is why this technique is typically reserved for specific attacks.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20092 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6.jpg" alt="" width="266" height="254" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6.jpg 266w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-200x191.jpg 200w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-41x39.jpg 41w" sizes="auto, (max-width: 266px) 100vw, 266px" /></p>
<p style="text-align: center;"><em>Figure 6 &#8211; Screenshot from chatGPT, pishing mail generation</em></p>
<p> </p>
<p style="text-align: justify;">ChatGPT has the potential to significantly change this dynamic, as it allows cybercriminals to <span style="color: #503078;"><strong>produce personalized and compelling messages for each target</strong>.</span> To include all necessary components, however, the chatbot requires detailed instructions.</p>
<p style="text-align: justify;">A notable advantage of ChatGPT is its capability to interact and create content in multiple languages, complete with reliable translation. In the past, this was a key way to identify scams and phishing attempts. While some methods are being developed to detect content created by ChatGPT, they haven&#8217;t yet proven entirely effective.</p>
<p style="text-align: justify;">This poses a significant risk to all companies, as it makes their employees more susceptible to such attacks and may expose their resources if passwords are stolen in this manner. As mentioned earlier, it is essential to raise awareness about this issue while also strengthening authentication methods, such as implementing two-factor authentication as a potential solution.</p>
<p style="text-align: justify;">Interestingly, other uses have been made of ChatGPT notoriety to develop scams without using the tool itself, such as <strong><span style="color: #503078;">phishing mails/Scams</span></strong> in order to push towards the purchase of a (fake)<span style="color: #503078;"><strong> ChatGPT subscription</strong> </span>and <a href="https://www.hackread.com/scammers-chatgpt-phishing-scam/?web_view=true">to provide personal data details</a></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #4 Exploit companies’ data</strong></h3>
<p style="text-align: justify;">ChatGPT has been trained on a massive amount of internet data, including personal sites and media content, meaning that it may have access to personal data that is currently hard to remove or control, as no &#8220;right to be forgotten&#8221; measures exist to date. Consequently, ChatGPT&#8217;s compliance with regulations like GDPR is under debate. GPT-4 can manage basic tasks related to personal and geographic information, such as identifying locations connected to phone numbers or educational institutions. By combining these capabilities, GPT-4 could be used to <span style="color: #503078;"><strong>identify individuals when paired with external data.</strong></span></p>
<p style="text-align: justify;">Another significant concern is the <span style="color: #503078;"><strong>sensitive information</strong></span> users might <span style="color: #503078;"><strong>provide through prompts</strong></span>. Users could inadvertently share confidential information when seeking assistance or using the chatbot for tasks, like reviewing and enhancing a draft contract. This information may appear in future responses to other users&#8217; prompts. They might not only find their confidential documents or research leaked on such platforms due to employees&#8217; inattention, but also reveal <span style="color: #503078;"><strong>information about their system or employees</strong></span> which will be used by hacker to <span style="color: #503078;"><strong>facilitate an intrusion</strong></span>. The primary course of action should be to increase awareness on this subject by providing formation and explanation or to restrict access to the website in the sensitive domains until there is a better comprehension of how data is utilized.</p>
<p style="text-align: justify;">Not only the real ChatGPT can be used for this objective, but the creation of <span style="color: #503078;"><strong>other chatbots</strong></span> using the same model as ChatGPT but configured to <span style="color: #503078;"><strong>trick victims into disclosing sensitive information</strong></span> or <span style="color: #503078;"><strong>downloading malware </strong></span>has also been observed.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #5 Disinformation campaigns </strong></h3>
<p style="text-align: justify;">ChatGPT can be used to quickly write very convincing articles and speeches <a href="https://www.nextinpact.com/article/70999/chatgpt-bard-et-autres-agents-desinformation-massive">based on fake news.</a> The American startup Newsguard <a href="https://www.newsguardtech.com/misinformation-monitor/jan-2023/">has conducted an experience</a> on ChatGPT to demonstrate its disinformation potential: on 100 fake information submitted to ChatGPT, the tool has produced fake detailed articles, essays and TV scripts for 80 of them, including significant topics such as Covid-19 and Ukraine<a href="#_edn2" name="_ednref2">[ii]</a>.</p>
<p style="text-align: justify;">As highlighted (again) by the war between Ukraine and Russia, <a href="https://www.nytimes.com/2023/02/08/technology/ai-chatbots-disinformation.html">the crucial role of information and disinformation</a> through cyber channels, can have significant consequences.</p>
<h3 style="text-align: justify;"><strong>Use Case #6 Create darknet marketplace</strong></h3>
<p style="text-align: justify;">Cybercriminals have also been observed using ChatGPT to support <span style="color: #503078;"><strong>the creation of DarkWeb marketplaces</strong>.</span> ChekPoint has illustrated this phenomenon with some examples<a href="#_edn3" name="_ednref3">[iii]</a>:</p>
<ul style="text-align: justify;">
<li>A cybercriminal post on a Darkweb forum showing how to code with ChatGPT a DarkWeb Market script that does not rely on Python or Java Script, using third-party API to get up-to-date cryptocurrency (Monero, Bitcoin and Etherium) prices as part of the Dark Web market payment system.</li>
<li>Dark web discussions threads linked to fraudulent usage of ChatGPT, such as how to generate an e-book or a short chapter using ChatGPT and then sell its content online.</li>
</ul>
<p> </p>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-20094 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7.png" alt="" width="675" height="242" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7.png 675w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-437x157.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-71x25.png 71w" sizes="auto, (max-width: 675px) 100vw, 675px" /></strong></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Screenshot from CheckPoint: Multiple threads in the underground forums on how to use ChatGPT for fraud activity</em></p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>What are the key take aways? </strong></h2>
<p style="text-align: justify;">Even if ChatGPT tends to lack of the necessary level of features, it can still be a useful tool to facilitate cyberattacks. Even if it is an obvious support tool mostly for script kiddies and unexperimented actors, ChatGPT &#8211; as any AI tool &#8211; can be a facilitator for any type of hackers, either to completely conceive a malware, to accelerate malicious actions such as phishing or to increase the sophistication level of cyberattacks.</p>
<p style="text-align: justify;">With the release of GPT-4, OpenAI has made efforts to counter inappropriate requests, however ChatGPT  still raise serious security issues and challenges for business security. It is important to keep in mind that the malicious use cases detailed in the previous section are only hypothetical scenarios: malicious use of ChatGPT has already been observed and it is essential to convey strong cybersecurity messages on the topic:</p>
<ul style="text-align: justify;">
<li>Don&#8217;t include sensitive info in queries to <a href="https://www.linkedin.com/feed/hashtag/?keywords=chatgpt&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7041697316570849280">#ChatGPT</a> : Avoid personal/sensitive information sharing while using ChatGPT</li>
<li>Stay informed and vigilant: AI-related topics are evolving quickly, it is central to stay put regarding tools evolution (e.g. release of Chat GPT 4.0), and new security topics that can emerged over time</li>
<li>Scams and phishing are likely to become more and more realistic in their crafting: continue raising awareness about this risk and train yourself and your ecosystem</li>
<li>Basic cybersecurity practices are still true: have a regular vulnerability management, set up doble authentication, train your teams and raise awareness…</li>
<li>ChatGPT opening the door to the possibility of creating realistic fake content, it is central to stay informed about tooling initiatives aiming at detecting machine-written text such as <a href="https://gptzero.me/">GPT Zero</a>, a tool developed by Princeton student (<em>Note: OpenAI is also working on a tool to detect machine-written text, but is for now far from being perfect since it </em><a href="https://www.nextinpact.com/article/70999/chatgpt-bard-et-autres-agents-desinformation-massive"><em>detect machine-written text only one in four times</em></a>)</li>
</ul>
<h1 style="text-align: center;">Reading of the Month</h1>
<h1 style="text-align: center;">CERT-EU : RUSSIA&#8217;S WAR ON UKRAINE: ONE YEAR OF CYBER OPERATIONS</h1>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-20096 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8.png" alt="" width="233" height="190" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8-48x39.png 48w" sizes="auto, (max-width: 233px) 100vw, 233px" /></strong></p>
<p style="text-align: center;"><a href="https://cert.europa.eu/static/MEMO/2023/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf">https://cert.europa.eu/static/MEMO/2023/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf</a></p>
<p style="text-align: justify;"><a href="#_ednref1" name="_edn1">[i]</a> <a href="https://cdn.openai.com/papers/gpt-4.pd">https://cdn.openai.com/papers/gpt-4.pd</a></p>
<p style="text-align: justify;"><a href="#_ednref2" name="_edn2">[ii]</a> <a href="https://www.newsguardtech.com/misinformation-monitor/jan-2023/">https://www.newsguardtech.com/misinformation-monitor/jan-2023/</a></p>
<p style="text-align: justify;"><a href="#_ednref3" name="_edn3">[iii]</a> <a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/">https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/">CDT Watch – March 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – January 2023</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 31 Jan 2023 15:35:54 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[ProxyNotShell]]></category>
		<category><![CDATA[sophos]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19543</guid>

					<description><![CDATA[<p>FOCUS TECH BLINDSIDE Facing the EDR behavioral supervision, attackers develop techniques for successful attacks by staying under the radars. One of these techniques is called Blindside. This technique works on many EDRs relying on a hook and was revealed by...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/">CDT Watch – January 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;">FOCUS TECH</h2>
<h3 style="text-align: center;">BLINDSIDE</h3>
<p style="text-align: justify;"><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">Facing </span><span class="NormalTextRun SCXW224371125 BCX0">the EDR </span><span class="NormalTextRun SCXW224371125 BCX0">behavioral </span><span class="NormalTextRun SCXW224371125 BCX0">supervisio</span><span class="NormalTextRun SCXW224371125 BCX0">n</span><span class="NormalTextRun SCXW224371125 BCX0">, attacker</span><span class="NormalTextRun SCXW224371125 BCX0">s</span><span class="NormalTextRun SCXW224371125 BCX0"> develop techniques </span><span class="NormalTextRun SCXW224371125 BCX0">for successful attacks </span><span class="NormalTextRun SCXW224371125 BCX0">by staying under the radars</span><span class="NormalTextRun SCXW224371125 BCX0">. One of these techniques is </span><span class="NormalTextRun SCXW224371125 BCX0">called </span></span><span style="color: #56008c;"><strong><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">Blindside</span></span></strong></span><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">. This technique works on </span><span class="NormalTextRun SCXW224371125 BCX0">many </span><span class="NormalTextRun SCXW224371125 BCX0">EDRs</span> <span class="NormalTextRun SCXW224371125 BCX0">relying</span><span class="NormalTextRun SCXW224371125 BCX0"> on </span><span class="NormalTextRun SCXW224371125 BCX0">a </span><span class="NormalTextRun SCXW224371125 BCX0">hook</span><span class="NormalTextRun SCXW224371125 BCX0"> and was revealed by </span></span><a class="Hyperlink SCXW224371125 BCX0" href="https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints" target="_blank" rel="noreferrer noopener"><span class="FieldRange SCXW224371125 BCX0"><span class="TextRun Underlined SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0" data-ccp-charstyle="Hyperlink">Cymulate</span></span></span></a><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">.</span></span><span class="EOP SCXW224371125 BCX0" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:-57,&quot;335559738&quot;:360,&quot;335559739&quot;:40,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19546 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1.png" alt="" width="1216" height="827" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1.png 1216w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-281x191.png 281w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-768x522.png 768w" sizes="auto, (max-width: 1216px) 100vw, 1216px" /></p>
<p style="text-align: justify;">According to <a href="https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints">Cymulate</a>, the author of Blindside, the technique is not immune to detection. Some mitigations can be implemented such as:</p>
<ul>
<li style="text-align: justify;"><span style="color: #56008c;"><strong>Monitor</strong></span><span style="color: initial;"> the use of the </span><span style="color: #1a7173;"><em>SetThreadContext</em></span><span style="color: initial;"> function: the function context can inform on breakpoint setting (write inside debug address registers)</span></li>
<li><span style="color: #56008c;"><strong>Monitor</strong></span> the presence of suspicious debug functions</li>
<li><span style="color: #56008c;"><strong>Edit EDR settings</strong> </span>for checking debug registers</li>
</ul>
<p style="text-align: justify;">It remains <span style="color: #56008c;"><strong style="font-size: revert; text-align: justify;">difficult to bypass EDR solutions</strong></span><span style="font-size: revert; text-align: justify; color: initial;"> as their detection methods vary between vendors. Nevertheless, it is important to remember that it is possible and </span><strong style="font-size: revert; text-align: justify; color: initial;"><span style="color: #56008c;">that the security should not rely solely on the solution</span>.</strong></p>
<p> </p>
<h2 style="text-align: center;">CERT-W: FROM THE FRONT LINE</h2>
<h3 style="text-align: center;">THE FIRST RESPONDER WORD</h3>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19548" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2.png" alt="" width="951" height="568" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2.png 951w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-768x459.png 768w" sizes="auto, (max-width: 951px) 100vw, 951px" /></p>
<p> </p>
<p> </p>
<h2 style="text-align: center;">READING OF THE MONTH</h2>
<h3 style="text-align: center;">SOPHOS: MATURING CRIMINAL MARKETPLACES PRESENT NEW CHALLENGES TO DEFENDERS</h3>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19550" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3.png" alt="" width="378" height="236" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3-306x191.png 306w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3-62x39.png 62w" sizes="auto, (max-width: 378px) 100vw, 378px" /></p>
<p style="text-align: center;"><a href="https://www.sophos.com/en-us/content/security-threat-report"><em>Maturing criminal marketplaces present new challenges to defenders, Sophos 2023 Threat Report</em></a></p>
<p> </p>
<h2 style="text-align: center;">VULNERABILITY OF THE MONTH</h2>
<h3 style="text-align: center;">PROXYNOTSHELL: WHEN APPLYING MITIGATIONS KEEPS YOU VULNERABLE</h3>
<p style="text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41040">CVE-2022-41040</a> &amp; <a href="https://nvd.nist.gov/vuln/detail/cve-2022-41082">CVE-2022-41082</a></p>
<p style="text-align: center;">Published by NVD: 02/10/2022</p>
<p style="text-align: center;"><strong>Products: </strong>Microsoft Exchange server</p>
<p style="text-align: center;"><strong>Versions: </strong>on-site/on premise 2013, 2016 and 2019</p>
<p style="text-align: center;"><strong>Score: 8.8 HIGH</strong></p>
<p style="text-align: center;"><a href="https://www.logpoint.com/fr/blog/proxynotshell-detection-de-lexploitation-des-vulnerabilites-zero-day-dans-le-serveur-exchange/"><strong>Context</strong></a> <strong> </strong><strong> </strong><a href="https://github.com/balki97/OWASSRF-CVE-2022-41082-POC"><strong>PoC</strong></a></p>
<p style="text-align: justify;">Microsoft Exchange is a mailbox <span style="color: #56008c;"><strong>server</strong></span> exclusively running on the Windows operating système.</p>
<p style="text-align: justify;">In September 2022, a vulnerability to <span style="color: #56008c;"><strong>compromise the underlying Exchange server</strong></span> was discovered. It was named <span style="color: #1a7173;"><strong>ProxyNotShell</strong></span> after its similarities with the <span style="color: #1a7173;"><strong>ProxyShell</strong></span> vulnerability. To exploit <span style="color: #1a7173;"><strong>ProxyNotShell</strong></span>, attackers need to have an authentified access to the Microsoft Echange server. The exploitation of the vulnerability allows attacker to deploy a webshell on the targeted server, giving them an initial access.</p>
<p style="text-align: justify;">Around November, <span style="color: #56008c;"><strong>a number of mitigations (Hotfix) were released</strong></span> awaiting for a patch. As a result, some <span style="color: #56008c;"><strong>60 000 servers</strong></span> worldwide still are vulnerables <span style="color: #56008c;"><strong>since the few mitigations rules can be bypassed by attackers</strong></span>.</p>
<p style="text-align: justify;">According to <a href="https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/">CrowdStrike</a>, <span style="color: #56008c;"><strong>Play ransomware group</strong></span>, which has been active since last June, took advantage of this in using a new exploit to bypass the URL rewrite mitigations for the <span style="color: #1a7173;">Autodiscover</span> endpoint. Early December the managed cloud hosting services company <span style="color: #1a7173;"><strong>Rackspace technology</strong></span> complies to having been attacked after a <span style="color: #56008c;"><strong>successful exploit of the vulnerability in Microsoft Exchange Server</strong></span>.</p>
<p style="text-align: justify;">The Microsoft Exchange server should have at least the <span style="color: #56008c;"><strong>KB5019758 patch</strong></span>. If not, the main action to perform is to <span style="color: #56008c;"><strong>immediately install the updates </strong></span>on the vulnerable servers. If some factors make the installation impossible, it is adviced to disable OWA until it can be applied. In addition, it is strongly recommended to disable remote <span style="color: #1a7173;">PowerShell</span> for non-admin users and use EDR tools to detect if web services are spawning PowerShell processes.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/">CDT Watch – January 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – December 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 10:48:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[BYOVKD]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Redis]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19444</guid>

					<description><![CDATA[<p>FOCUS TECH BRING YOUR OWN VULNERABLE KERNEL DRIVER (BYOVKD) Facing the EDR behavioral supervision, attacker develops techniques for successful attacks by staying under the radars. One of these techniques is called BYOVKD: Bring Your Own Vulnerable Kernel Driver. Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/">CDT Watch – December 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;">FOCUS TECH</h2>
<h3 style="text-align: center;">BRING YOUR OWN VULNERABLE KERNEL DRIVER (BYOVKD)</h3>
<p style="text-align: justify;">Facing the EDR behavioral supervision, attacker develops techniques for successful attacks by staying under the radars. One of these techniques is called BYOVKD: Bring Your Own Vulnerable Kernel Driver.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19447" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1.png" alt="" width="1625" height="1091" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1.png 1625w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-768x516.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-1536x1031.png 1536w" sizes="auto, (max-width: 1625px) 100vw, 1625px" /></p>
<p style="text-align: justify;">Even if it does not raise an alert on the EDR console, the Defense team must <strong>be vigilant</strong> to any telemetry that would indicate the <strong>loading of an unusual driver on assets</strong>. Furthermore, <strong>prevention mechanisms</strong> exist for this type of case, some examples below:</p>
<ul>
<li style="text-align: justify;"><a href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#block-abuse-of-exploited-vulnerable-signed-drivers">Block abuse of exploited vulnerable signed drivers</a></li>
<li style="text-align: justify;"><a style="font-size: revert;" href="https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules">Driver block rules</a></li>
</ul>
<h2> </h2>
<h2 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h2>
<h3 style="text-align: center;">THE FIRST RESPONDER WORD</h3>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19449" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2.png" alt="" width="770" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2.png 770w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-355x191.png 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-768x413.png 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /></p>
<p> </p>
<p> </p>
<h2 style="text-align: center;"><strong>READING OF THE MONTH</strong></h2>
<h3 style="text-align: center;">EMOTET</h3>
<p><strong>What is Emotet 2022?</strong></p>
<p style="text-align: justify;"><strong>Emotet is a <em>Malware-as-a-Service</em></strong> (<em>MaaS</em>) relying on a botnet network which appeared in 2014. It was originally designed as a banking Trojan aiming to steal sensitive information related to bank accounts<em>.</em> In 2021, police forces arrested several people belonging to Emotet organization, which then <strong>reappeared with new features in 2022</strong>. The group behind Emotet seems to be <strong>opportunist</strong> and most of its victims are from US, UK, Japan, Germany, Italy, Spain, <strong>France</strong>, and Brazil.</p>
<p><strong>Why is it dangerous?</strong></p>
<p style="text-align: justify;">Emotet is a polymorphic malware whose code changes over time. Among the numerous new features of the 2022 version, searchers from the <a href="https://thedfirreport.com/2022/09/12/dead-or-alive-an-emotet-story/">DFIR Report</a> have identified an ability to <strong>bypass anti-malware detection</strong>. To do that, Emotet 2022 uses a 64 bits base code and various signatures to avoid pattern recognition. The malware is also able <strong>to keep itself up to date</strong> once downloaded by using <strong>Command &amp; Control servers</strong>, which send it updates the same as an Operating System. The <em>MaaS</em> is also <strong>able to release IcedID</strong>, which are modular banking Trojans able <strong>to drop other malwares</strong>. Doing so, Emotet helped to distribute ransomwares for impact, Cobalt Strike for initial access, XMRig for stealing wallet data…</p>
<p><strong>How does Emotet 2022 initial infection work?</strong></p>
<p style="text-align: justify;">Using a <strong>phishing email with a malicious Office attachment</strong>, Emotet exploits a 2017 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-11882">Microsoft vulnerability</a> which allows remote code execution on vulnerable devices (CVE 2017-11882) to compromise its first victim.</p>
<p style="text-align: justify;">Once downloaded in memory, the malware executes a sequence of legitimate Windows commands to <strong>perform a recognition of its environment,</strong> then spreads in the local network and steals information.</p>
<p style="text-align: justify;">Emotet spreads through spam emails. According to <a href="https://www.deepinstinct.com/blog/emotet-malware-returns-in-2022"><em>Deep Instinct</em></a>, 45% of them are containing malicious Office attachment such as Spreadsheets or scripts in most of the cases. As those emails traduce the object and attachments names in the target’s local language and come from known senders, the phishing looks particularly realistic.<img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19451" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3.png" alt="" width="1111" height="528" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3.png 1111w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-402x191.png 402w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-768x365.png 768w" sizes="auto, (max-width: 1111px) 100vw, 1111px" /></p>
<p style="text-align: center;"><a href="https://www.proofpoint.com/us/blog/threat-insight/comprehensive-look-emotets-fall-2022-return">Comprehensive look of EMOTET fall 2022</a></p>
<p style="text-align: left;"><strong>Why is this new version of the MaaS particularly tricky?</strong></p>
<p style="text-align: justify;">Emotet 2022 can identify whether it’s downloaded into a sandbox environment, or a device connected to a network. In the first configuration it won’t activate itself, but in the second it will rely <strong>on a password dictionary to spread</strong> thanks to brute-force.  Moreover, the November 2022 Excel files generally enclosed <strong>contains macros which no longer needs a user click to be authorized</strong>. The victim is only asked two things: <strong>copying the files into the Microsoft Office Template zone, which requires administrator privileges</strong>. Opening the file in this location will execute the macros without any warnings.</p>
<p style="text-align: justify;"><strong>How to protect from Emotet 2022?</strong></p>
<p>Since Emotet 2022 uses malicious spam and phishing is the most used technique for initial access, we highly advice you to consider these measures:</p>
<ul>
<li style="text-align: justify;">Provide your company a <strong>solution against phishing</strong>.</li>
<li style="text-align: justify;">Launch an <strong>awareness campaign</strong> for employees and stakeholders.</li>
<li style="text-align: justify;">Provide you company an <strong>Endpoint Detection and Response</strong> which complete the anti-virus by performing <strong>behavioural analysis</strong>, which helps visualize the virus kill chain to identify the action levers.</li>
</ul>
<p style="text-align: justify;">Give a local administrator account to an employee only in case of specific need.</p>
<p> </p>
<h2 style="text-align: center;">VULNERABILITY OF THE MONTH</h2>
<h3 style="text-align: center;">DEBIAN-SPECIFIC REDIS SERVER LUA SANDBOX ESCAPE VULNERABILITY &#8211; <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0543"><strong>CVE-2022-0543</strong></a></h3>
<p style="text-align: center;">Published by NVD: 18/02/2022</p>
<p style="text-align: center;"><strong>Products: </strong>Redis server for Debian and Debian-derived Linux distributions</p>
<p style="text-align: center;"><strong>Versions: </strong>less and equal to 5:5.0.14-1+deb10u2, 5:6.0.16-1+deb11u2, 5:7.0.5-1, 5:7.0.7-1</p>
<p style="text-align: center;"><strong>Score: </strong><strong>10 CRITICAL</strong></p>
<p style="text-align: center;"><a href="https://blog.aquasec.com/redigo-redis-backdoor-malware"><strong>Context</strong></a><strong>  </strong><a href="https://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html"><strong>PoC</strong></a></p>
<p style="text-align: justify;"><a href="https://redis.io/">Redis</a> is an opensource NoSQL database management system. Redis includes an <strong>embedded Lua scripting engine</strong>, it allows client to run scripts. By design, the Lua engine must be <strong>sandboxed</strong>: it means that packages and APIs available are limited in an execution context. Redis clients <strong>are not allowed to execute arbitrary code</strong> on the Redis server.</p>
<p style="text-align: justify;">In some <strong>Debian and Debian-derived Linux packages</strong>, the Lua environment is <strong>not sufficiently regulated </strong>because the Lua Library is provided as a dynamic library. It can allow attackers to access arbitrary Lua functionalities and results in a Lua Sandbox escape.</p>
<p style="text-align: justify;">Early December, reports indicate that attackers are exploiting this vulnerability <strong>to deploy a new backdoor malware dubbed Redigo</strong> on Redis Server. The malware communicates with a server of command and control using <strong>port 6379 </strong>which is a legitimate port used by Redis for communication between client and server: the Redis server joins a botnet network.</p>
<p style="text-align: justify;">According to <a href="https://blog.aquasec.com/redigo-redis-backdoor-malware"><em>Aqua</em></a>, the malware has some functions specially written to the Redis server which may imply that the group behind this desired <strong>to build an adjusted attack that would target Redis servers</strong>.</p>
<p style="text-align: justify;"><strong>A successful attack implies that attacker could execute arbitrary commands and access to sensitive information.</strong></p>
<p style="text-align: justify;">A group of attackers is behind the Redigo malware which is an emerging threat. Furthermore, the <strong>exploit of the CVE-2022-0543 is public</strong> and is <strong>used in the wild</strong> to deploy the malware. <strong>Vulnerable Redis Server must be patched and up to date</strong>.</p>
<p> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/">CDT Watch – December 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – November 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 15:54:26 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ENISA]]></category>
		<category><![CDATA[SUPPLY CHAIN]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19173</guid>

					<description><![CDATA[<p>EDITO What are the supply chain threats? What’s a picture of the current situation? Since 2019, there has been a growing focus on third-party attacks. With good reason: CyberArck estimates in a study from 2022 that 71% of organizations suffered...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/">CDT Watch – November 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>EDITO</strong></h1>
<h2 style="text-align: center;">What are the supply chain threats?</h2>
<p><strong>What’s a picture of the current situation? </strong></p>
<p>Since 2019, there has been a growing focus on third-party attacks. With good reason: CyberArck estimates in a study from 2022 that <a href="http://www.cyberview.com.tw/wp-content/uploads/2022/05/cyberark-2022-identity-security-threat-landscape-report.pdf">71% of organizations</a> suffered a successful</p>
<p>software supply chain-related attack that resulted in data loss or asset compromise. According to Argon Security – recently acquired by Aqua Security – published the latest edition of its annual Software Supply Chain Security Review this week. The Software Supply Chain Security Review from Argon’s report that software supply chain attacks grew by <a href="https://www.developer-tech.com/news/2022/jan/20/software-supply-chain-attacks-increased-over-300-percent-in-2021/">more than 300% in 2021</a> compared to 2020.</p>
<p>In terms of maturity, in 2022: a survey of 1,000 CIOs found that 82% said their organization is vulnerable to cyber-attacks targeting software supply chains <a href="https://www.venafi.com/sites/default/files/2022-05/Venafi_WhitePaper_CIOStudy_SoftwareBuildPipelinesAttackSurfaceExpanding_2022_f%20.pdf">(Venafi)</a>. From our own Cyberbenchmark, we can see that 50% of our interviewee don’t control their security requirements with their third party and 15% conduct audits on their most critical suppliers in 2022.</p>
<p> </p>
<p><strong>What kind of attacks are we talking about?  </strong></p>
<p>Attacks on the supply chain are related to threats around third parties. <a href="https://www.enisa.europa.eu/publications/threat-landscape-for-supply-chain-attacks">ENISA</a> defines this type of attack as follows: “ A supply chain attack is a combination of at least two attacks. The first attack is on a supplier that is then used to attack the target to gain access to its assets. The target can be the final customer or another supplier. Therefore, for an attack to be classified as a supply chain one, both the supplier and the customer have to be targets.”</p>
<p>As a reminder the supply chain involves a wide range of resources (hardware and software), storage (cloud or local), distribution mechanisms (web applications, online stores), and management software</p>
<ul>
<li><strong>Indirect or bounce attack:</strong> An attack on one or more intermediate information systems. The attacker uses the supplier as an entry vector to retrieve the information needed to access the final target.</li>
<li><strong>Supply chain attack:</strong> the attacker relies on a software production chain to infect a legitimate program and distribute it to third parties.</li>
</ul>
<p> </p>
<p><strong>Why is it serious?</strong></p>
<p>First because these attacks are <strong>complicated to detect:</strong> originally used for espionage, these are attacks where the attacker aims to remain discreet until the attack is launched. Second because it is a <strong>one-to-</strong><strong>many kind of attack</strong>. A small change in software source code can affect the entire supply chain (plus, the chains are increasingly interconnected). The most known example is Kaseya and its 800 and 1,500 total businesses affected victims. Thirdly, many enterprises don’t have <strong>enough visibility on their ecosystem</strong> to anticipate or even detect the flaws in their IS. As we have seen, the security maturity in this field is currently quite low.</p>
<p><strong>There are some aggravating factors:</strong></p>
<ul>
<li>The cyber criminal’s ecosystem has matured and industrialized, allowing more sophisticated attacks to target matured victims. ​They can therefore afford this kind of sophisticated attack which used to take time, financial investment, and expertise&#8230;</li>
<li>Expansion of the attack surface: The IS ecosystem is increasingly large, and increasingly interconnected, and more and more third parties are involved. They have potentially less control of the IS and less visibility, therefore potentially less control of the security of all these third parties, particularly in IAM management: who has very privileged access rights to its IS&#8230;</li>
<li>The risk is to give access to third parties who can represent entry points for attackers: to one&#8217;s IS and to one&#8217;s sensitive data since one shares them with third parties</li>
<li>In 2021, in an analysis conducted with 1200 CISOs (in America, Europe and Singapore), about 38% of respondents said that they had no way of knowing when or whether an issue arises with a third-party supplier&#8217;s cybersecurity (in 2020, it was 31%) <a href="https://www.bluevoyant.com/press-releases/bluevoyant-research-reveals-rise-in-supply-chain-cybersecurity-breaches-as-firms-struggle-to-effectively-monitor-third-party-cyber-risk">(BlueVoyant66)</a></li>
<li>Github estimates that there is 203 dependencies on an average software project in 2022.  If a popular app includes one compromised dependency, every business that downloads from the vendor is compromised as well, so the number of victims can grow exponentially.</li>
</ul>
<p> </p>
<p><strong>Examples of attacks</strong></p>
<ul>
<li><strong>Compromise intermediate elements of the supply chain​</strong> (i.e. source code tools) ​</li>
</ul>
<p>Midstream attacks target intermediate elements such as software development tools, manipulating the build process of the artifact​</p>
<ul>
<li>Ex: SolarWinds</li>
<li><strong>Compromise upstream software </strong>​(i.e. compromising the source code)​</li>
</ul>
<p>Infects a system that is &#8216;upstream&#8217; of users, for example through a malicious update, which then infects all &#8216;downstream&#8217; users who download it. ​</p>
<ul>
<li>One of the biggest was the compromise of CCleaner 2017 update  with 2.3 million users impacted</li>
</ul>
<ul>
<li><strong>Compromise project interdependencies​</strong></li>
</ul>
<p>Compromise third-party components, such as an open-source package​</p>
<p>Dependencies confusion: the attackers provide a fake “new” upgrade of a software’s project needed component for the targeted software to automatically download it and implement it in the project. ​</p>
<ul>
<li>Ex: Apple, Microsoft, Uber, Paypal (BugBounty 2020)</li>
</ul>
<p>Within these strategies, one of the most impactful methods is <strong>to target the CI/CD pipeline</strong>. If the infrastructure is not secured enough and there is a poor access management (our audit teams often see this), it can be easily targeted. Once compromised, the attacker has access to a part of the critical &#8216;linfra, to the source code of the application and the infrastructure and can generally do what he wants</p>
<p><strong>The impacts are high: </strong></p>
<ul>
<li>Attackers have access to critical IT infrastructure, development processes, source code, libraries, and applications: ​</li>
<li>Modify the code or inject malicious code during the build process and alter the application ​</li>
<li>Deploy malware via the orchestrator directly on production environments</li>
</ul>
<p> </p>
<p> </p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-19175" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-366x191.png" alt="" width="863" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-366x191.png 366w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-768x401.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image.png 1486w" sizes="auto, (max-width: 863px) 100vw, 863px" /></p>
<p> </p>
<p> </p>
<h1 style="text-align: center;"><strong>READING OF THE MONTH</strong></h1>
<h2 style="text-align: center;">ENISA</h2>
<p style="text-align: center;">This is the tenth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape. It identifies the top threats, major trends observed with respect to threats, threat actors and attack techniques, as well as impact and motivation analysis.</p>
<p><img loading="lazy" decoding="async" class="wp-image-19177 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-315x191.png" alt="" width="400" height="243" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-315x191.png 315w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-768x466.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2.png 963w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p style="text-align: center;"><a href="https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022">Link to the report</a></p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/">CDT Watch – November 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – June 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/06/cdt-watch-june-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/06/cdt-watch-june-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 30 Jun 2022 08:50:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Newsletter CERT]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[tech]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18163</guid>

					<description><![CDATA[<p>FOCUS TECH Bumblebee     Initial Access (TA0001) Execution (TA0002) Persistence (TA0003) Privilege Escalation (TA0004) Phishing: Spearphishing Attachment T1566.001 Command and Scripting Interpreter: Visual Basic T1059.005 Scheduled Task/Job T1053 Process Injection: Dynamic-link Library Injection T1055.001 Phishing: Spearphishing Link T1566.002 Windows Management Instrumentation...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/06/cdt-watch-june-2022/">CDT Watch – June 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Bumblebee</h2>
<p><img loading="lazy" decoding="async" class=" wp-image-18167 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/slide-3-262x191.png" alt="" width="797" height="581" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/slide-3-262x191.png 262w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/slide-3-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/slide-3-768x561.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/slide-3.png 1364w" sizes="auto, (max-width: 797px) 100vw, 797px" /></p>
<p> </p>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-18171" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/SLIDE-2-272x191.jpg" alt="" width="891" height="626" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/SLIDE-2-272x191.jpg 272w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/SLIDE-2-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/SLIDE-2-768x539.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/SLIDE-2.jpg 1369w" sizes="auto, (max-width: 891px) 100vw, 891px" /></p>
<p> </p>
<table width="622">
<tbody>
<tr>
<td width="156">
<h5><strong><u>Initial Access</u></strong></h5>
<h5><strong><u>(TA0001)</u></strong></h5>
</td>
<td width="156">
<h5><strong><u>Execution</u></strong></h5>
<h5><strong><u>(TA0002)</u></strong></h5>
</td>
<td width="156">
<h5><strong><u>Persistence</u></strong></h5>
<h5><strong><u>(TA0003)</u></strong></h5>
</td>
<td width="156">
<h5><strong><u>Privilege Escalation</u></strong></h5>
<h5><strong><u>(TA0004)</u></strong></h5>
</td>
</tr>
<tr>
<td width="156">
<p><strong>Phishing</strong>:</p>
<p>Spearphishing Attachment</p>
<p><a href="https://attack.mitre.org/techniques/T1566/001/">T1566.001</a></p>
</td>
<td width="156">
<p><strong>Command and Scripting Interpreter:</strong> Visual Basic</p>
<p><a href="https://attack.mitre.org/techniques/T1059/005/">T1059.005</a></p>
</td>
<td width="156">
<p>Scheduled Task/Job</p>
<p><a href="https://attack.mitre.org/techniques/T1053/">T1053</a></p>
</td>
<td width="156">
<p><strong>Process Injection:</strong> Dynamic-link Library Injection</p>
<p><a href="https://attack.mitre.org/techniques/T1055/001/">T1055.001</a></p>
</td>
</tr>
<tr>
<td width="156">
<p><strong>Phishing:</strong> Spearphishing Link</p>
<p><a href="https://attack.mitre.org/techniques/T1566/002/">T1566.002</a></p>
</td>
<td width="156">
<p>Windows Management Instrumentation</p>
<p><a href="https://attack.mitre.org/techniques/T1047/">T1047</a></p>
</td>
<td width="156">
<p> </p>
</td>
<td width="156">
<p><strong>Process Injection: </strong>Asynchronous Procedure Call</p>
<p><a href="https://attack.mitre.org/techniques/T1055/004/">T1055.004</a></p>
</td>
</tr>
</tbody>
</table>
<h1> </h1>
<table style="width: 100%; height: 907px;">
<tbody>
<tr style="height: 108px;">
<td style="height: 108px;" width="155">
<h5><strong><u>Defense Evasion</u></strong></h5>
<h5><strong>(TA0005)</strong></h5>
</td>
<td style="height: 108px;" width="155">
<h5><strong><u>Discovery</u></strong></h5>
<h5><strong>(TA0007)</strong></h5>
</td>
<td style="height: 108px;" width="155">
<h5><strong><u>Command and Control</u></strong></h5>
<h5><strong>(TA0011)</strong></h5>
</td>
</tr>
<tr style="height: 138px;">
<td style="height: 138px;" width="155">
<p><strong>Process Injection:</strong> Dynamic-link Library Injection</p>
<p><a href="https://attack.mitre.org/techniques/T1055/001/">T1055.001</a></p>
</td>
<td style="height: 138px;" width="155">
<p>System Information Discovery</p>
<p><a href="https://attack.mitre.org/techniques/T1082/">T1082</a></p>
</td>
<td style="height: 138px;" width="155">
<p><strong>Encrypted Channel: </strong>Symmetric Cryptography</p>
<p><a href="https://attack.mitre.org/techniques/T1573/001/">T1573.002</a></p>
</td>
</tr>
<tr style="height: 138px;">
<td style="height: 138px;" width="155">
<p><strong>Process Injection</strong>: Asynchronous Procedure Call</p>
<p><a href="https://attack.mitre.org/techniques/T1055/004/">T1055.004</a></p>
</td>
<td style="height: 138px;" width="155">
<p>Process Discovery</p>
<p><a href="https://attack.mitre.org/techniques/T1057/">T1057</a></p>
</td>
<td style="height: 138px;" width="155">
<p>Ingress Tool Transfer</p>
<p><a href="https://attack.mitre.org/techniques/T1105/">T1105</a></p>
</td>
</tr>
<tr style="height: 138px;">
<td style="height: 138px;" width="155">
<p><strong>Hide Artifacts:</strong> Hidden Files and Directories</p>
<p><a href="https://attack.mitre.org/techniques/T1564/001/">T1564.001</a></p>
</td>
<td style="height: 138px;" width="155">
<p> </p>
</td>
<td style="height: 138px;" width="155">
<p> </p>
</td>
</tr>
<tr style="height: 138px;">
<td style="height: 138px;" width="155">
<p><strong>Indicator Removal on Host</strong>: File Deletion</p>
<p><a href="https://attack.mitre.org/techniques/T1070/004/">T1070.004</a></p>
</td>
<td style="height: 138px;" width="155">
<p> </p>
</td>
<td style="height: 138px;" width="155">
<p> </p>
</td>
</tr>
<tr style="height: 109px;">
<td style="height: 109px;" width="155">
<p>Virtualization/Sandbox Evasion</p>
<p><a href="https://attack.mitre.org/techniques/T1497/">T1497</a></p>
</td>
<td style="height: 109px;" width="155">
<p> </p>
</td>
<td style="height: 109px;" width="155">
<p> </p>
</td>
</tr>
<tr style="height: 138px;">
<td style="height: 138px;" width="155">
<p>Deobfuscate/Decode Files or Information</p>
<p><a href="https://attack.mitre.org/techniques/T1140/">T1140</a></p>
</td>
<td style="height: 138px;" width="155">
<p> </p>
</td>
<td style="height: 138px;" width="155">
<p> </p>
</td>
</tr>
</tbody>
</table>
<h3 style="text-align: center;">SOURCES :</h3>
<p><a href="https://www.proofpoint.com/us/blog/threat-insight/bumblebee-is-still-transforming"><img loading="lazy" decoding="async" class="size-medium wp-image-18176 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/proofpoint-437x181.jpg" alt="" width="437" height="181" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/proofpoint-437x181.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/proofpoint-71x29.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/proofpoint.jpg 637w" sizes="auto, (max-width: 437px) 100vw, 437px" /></a></p>
<h6 style="text-align: center;"><a href="https://www.proofpoint.com/us/blog/threat-insight/bumblebee-is-still-transforming"><strong>Bumblebee is still transforming, Proofpoint</strong></a></h6>
<p style="text-align: center;">[1] <a href="https://www.malware-traffic-analysis.net/2022/index.html">https://www.malware-traffic-analysis.net/2022/index.html</a></p>
<p style="text-align: center;">[2]<a href="https://isc.sans.edu/forums/diary/How+the+Contact+Forms+campaign+tricks+people/28142/">https://isc.sans.edu/forums/diary/How+the+Contact+Forms+campaign+tricks+people/28142/</a></p>
<h1> </h1>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-18173" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/first-reponder-383x191.png" alt="" width="906" height="452" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/first-reponder-383x191.png 383w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/first-reponder-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/first-reponder-768x383.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/first-reponder-800x400.png 800w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/first-reponder.png 1485w" sizes="auto, (max-width: 906px) 100vw, 906px" /></p>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the article of Robert Lemos, a darkreading contributing writer about firms which suffers identity-related breaches.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18178 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/firms.jpg" alt="" width="411" height="173" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/firms.jpg 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/firms-71x30.jpg 71w" sizes="auto, (max-width: 411px) 100vw, 411px" /></p>
<h6 style="text-align: center;"><a href="https://www.darkreading.com/operations/identity-related-breaches-last-12-months"><strong>80% of firms suffered identity-related breaches in last 12 months, Robert Lemos</strong></a></h6>
<p> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/06/cdt-watch-june-2022/">CDT Watch – June 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/06/cdt-watch-june-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – May 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/#respond</comments>
		
		<dc:creator><![CDATA[Margaux Nedelec]]></dc:creator>
		<pubDate>Mon, 30 May 2022 12:53:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[marketplace]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18045</guid>

					<description><![CDATA[<p>DECRYPTION The marketplaces of stolen data Which type of data are sold? The different platforms of marketplaces sell different types of data. While some platforms are really focused on selling one specific “product” (eg. hacking forums where Initial Access to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/">CDT Watch – May 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">The marketplaces of stolen data</h2>
<p><img loading="lazy" decoding="async" class="wp-image-18145 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21-437x121.png" alt="" width="867" height="240" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21-437x121.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21-768x212.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21.png 1392w" sizes="auto, (max-width: 867px) 100vw, 867px" /></p>
<p><img loading="lazy" decoding="async" class="wp-image-18143 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22-437x118.png" alt="" width="844" height="228" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22-437x118.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22-768x207.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22.png 1386w" sizes="auto, (max-width: 844px) 100vw, 844px" /></p>
<p><img loading="lazy" decoding="async" class="wp-image-18141 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23-437x122.png" alt="" width="874" height="244" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23-437x122.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23-768x214.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23.png 1387w" sizes="auto, (max-width: 874px) 100vw, 874px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18139 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24-437x120.png" alt="" width="841" height="231" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24-437x120.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24-768x211.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24.png 1384w" sizes="auto, (max-width: 841px) 100vw, 841px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18137 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25-437x122.png" alt="" width="860" height="240" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25-437x122.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25-768x214.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25.png 1387w" sizes="auto, (max-width: 860px) 100vw, 860px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18135 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26-437x119.png" alt="" width="914" height="249" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26-437x119.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26-768x210.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26.png 1392w" sizes="auto, (max-width: 914px) 100vw, 914px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18133 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1-437x121.png" alt="" width="943" height="261" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1-437x121.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1-768x213.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1.png 1389w" sizes="auto, (max-width: 943px) 100vw, 943px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18131 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28-437x119.png" alt="" width="943" height="257" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28-437x119.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28-768x209.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28.png 1384w" sizes="auto, (max-width: 943px) 100vw, 943px" /></p>
<p><strong>Which type of data are sold?</strong></p>
<p>The different platforms of marketplaces sell different types of data. <strong>While some platforms are really focused on selling one specific “product”</strong> (eg. hacking forums where <a href="https://www.proofpoint.com/us/blog/threat-insight/first-step-initial-access-leads-ransomware">Initial Access to companies is sold</a>, as well as auction sites to sell stolen data <a href="https://www.zdnet.com/article/revil-ransomware-gang-launches-auction-site-to-sell-stolen-data/">eg. REvil and its auction site</a> back in 2020), <strong>other platforms thrive with a very wide panel of goods,</strong> ranging from various weapons to “fullz” (full data about people: Social Security numbers, Bank account numbers, ID,…) without forgetting per-install malware service and financial information about a company. Overall, personal data is one of the most common types one can find on these marketplaces, as well as organization initial access, and non-financial or financial accounts/credentials.</p>
<p>When it comes to prices, <strong>whereas the number and variety of data items sold are increasing, </strong><a href="https://www.privacyaffairs.com/dark-web-price-index-2022/">the prices are declining as the market grows.</a></p>
<p>The price of an Initial Access depends on its quality, but it ranges <a href="https://www.zdnet.com/article/ransomware-operators-love-them-key-trends-in-the-initial-access-broker-space/">from a couple of hundred USD for a small company to hundreds of thousands of dollars for the bigger ones.</a> The average price is <u>$7,100 in 2021</u>. Patricia Ruffio listed <a href="https://www.privacyaffairs.com/dark-web-price-index-2022/">here the prices found per type of data</a>, from credit card data with account balance up to 5K ($120) to social media account ($65 for a gmail account), going through PayPal account logins ($150 for 50 accounts) and European Passport ($3,800). In comparison, DDOSing an unprotected website for a month now costs $850 on average and installing malware on a thousand devices ranges from $45 to $5500 depending on its quality and success rate.</p>
<p>Last but not least, some ransomware groups <a href="https://unit42.paloaltonetworks.com/blackbyte-ransomware/">such as BlackByte</a> go as far as selling stolen data on dedicated auction sites, not only as a means of pressure on victim companies, but also as a very juicy second revenue stream, <a href="https://www.telekom.com/en/blog/group/article/lockdata-auction-631300">with starting bids reaching up to $500,000</a><u>. </u></p>
<p> </p>
<p><strong>What’s the selling process?</strong></p>
<p>Besides a classical strategy of competitivity between the different marketplaces, based on discounts or fidelity points, the platforms are fighting over a security aspect in order to gain the buyer’s trust.</p>
<p>With the growth of marketplaces comes a strong trend for the sellers to strengthen their client’s trust. Taking advantage of legal uncertainty, these websites or events like the <a href="https://www.theguardian.com/technology/2015/mar/18/bitcoin-deep-web-evolution-exit-scam-12-million-dollars">Evolution Marketplace exit scam with over $12 million in Bitcoin</a> have greatly tarnished their reputation and taken its toll on customer and vendor trust.</p>
<p>As a result, along with the numerous DDOS protection, layers marketplaces now hide behind to prevent attacks from rivals, the quality of vendors and their items is now more thoroughly assessed and monitored. Direct scams are supposedly prevented by using the marketplace platform as an intermediate deposit for payment so that a client may be refunded in case of deception by the vendor. All transactions are currently mainly in Bitcoin and Monero for anonymity purposes.  Some auction and IAB platforms even sometimes use <a href="https://www.telekom.com/en/blog/group/article/lockdata-auction-631300">mandatory referral systems to shield themselves from outsiders &amp; untrustworthy members</a><u>. </u></p>
<p><strong>Consequently, dark web marketplaces seem more reliable and stolen data is more prone to be sold quickly.</strong></p>
<p> </p>
<p><strong>Once sold, what are the stolen data used for?</strong></p>
<p>The financial reason is undoubtedly the main aspect for many actors in the market: most of these data can be used directly for blackmail of course, or to launch another cyberattack with a bigger impact…and more gains. It can be “standard” attacks such as personal data simply used as a basis for phishing operations and for compromising, for example, bank accounts, or it can be larger attacks. In fact, the average ransom paid by companies rose up to $541k <a href="https://www.paloaltonetworks.com/company/press/2022/ransomware-payments-hit-new-records-in-2021-as-dark-web-leaks-climbed--according-to-new-report-from-palo-alto-networks-unit-42#:~:text=The%20average%20ransom%20demand%20in,Unit%2042%20Ransomware%20Threat%20Report.">according to the 2022 Unit 42 Ransomware Threat Report</a>, highlighting the high profitability of simple ransom and blackmail with the stolen data. While not as straightforward, leveraging stolen Social Security Numbers, IDs, Credit cards are other ways to generate profit or to gain access to companies using identity theft.</p>
<p>However, stolen data may be used for more varied purposes. Corporate espionage is one of them: should a competitor be informed of a potential data leak, and what prevents it from looking at your deepest hidden secrets? It can also be a political matter: for example when <a href="https://securityaffairs.co/wordpress/127267/cyber-crime/ministry-of-justice-of-france-lockbit.html">Lockbit2.0 hits the French ministry of Justice</a><u>,</u> the main concerns shift to who laid their hands on such potentially sensitive pieces of information and what their intentions are. Another example of societal impact would be the <a href="https://www.fiercepharma.com/pharma/hackers-breach-pfizer-biontech-covid-19-vaccine-data-cyberattack-targeting-ema">data breach of Pfizer/BioNTech vaccines data in 2020</a><u>, </u>which led to attackers modifying the stolen data on the vaccine and publishing them with the headline &#8220;Vaccines are malicious&#8221;.</p>
<p> </p>
<p><strong>What are the impacts on my organization?</strong></p>
<p>As mentioned, the collected data such as initial access can be the essential vector to compromise an organization’s SI and lead to even more impacting attacks. Besides, the main victim’s perimeter is not the only one compromised: the whole ecosystem of partners, clients, and providers… can be affected. If the ransomware is the first type of attack coming to mind after a data breach, one should not underestimate the impacts of identity impersonation and fraud, targeted DDoS…</p>
<p>As it has often been proven and discussed these last years, <strong>the financial impact</strong> of such compromission can be colossal and even led organizations to their end. Besides, <strong>the cost of the attack itself is not the only one to be taken into account.</strong> Other components must be considered: <strong>loss of customer&#8217;s trust</strong>, loss due to potential system&#8217;s unavailability, <strong>cost of intervention </strong>from experts to investigate, but also <strong>cost of new customer acquisition</strong> to win back those that have been lost. Just as an example, <a href="https://www.csoonline.com/article/3444488/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html">Equifax announced</a> that the data breach it faced in 2017 cost around $1.5 billion dollars if not more.</p>
<p><strong>The financial and reputational impacts are intrinsically linked.</strong> Indeed, upon facing a data breach, a company is very likely to get customer or partner disengagement. <a href="https://www.ibm.com/downloads/cas/OJDVQGRY">According to a report from IBM</a><u>, the </u>lost business contributes to 38% of data breach costs. Companies also handle PII (Personally Identifiable Information) which, if stolen, can lead to additional legal costs, class-action settlements, or fines from public institutions.</p>
<p>The total cost of a data breach could be deadly for some companies and must be acknowledged. <a href="https://www.ftc.gov/enforcement/refunds/equifax-data-breach-settlement">Equifax spent several million</a> in fines and settlements after dealing with its massive data breach in 2017.</p>
<p>Last but not least, the social and political aspects must not be neglected. Last year, the Labour Party suffered a data breach through a ransomware attack on a third-party supplier. This kind of attack can lead to disinformation campaigns or even interferences in the election process.</p>
<p>In order to prevent a data breach, beyond cybersecurity basic actions, companies must enhance their maturity level when it comes to data security. Evaluating the value of the data is one of the key: the more attractive the data is, the greater chance an attacker will try to steal it. Storage and network security, Identity and Access Management, Cyber Resilience are some of the topics to be addressed at first. On top of this, companies should also focus on creating a strong watch on cybersecurity events and implement, even small, Cyber Threat Intelligence programs. Looking at the cybercrime ecosystem as well as spotting potential attack vectors and modus operandi is never a bad idea to anticipate a cyberattack.</p>
<p> </p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<p><img loading="lazy" decoding="async" class="wp-image-18150 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder-360x191.png" alt="" width="1012" height="537" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder-768x407.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder.png 1437w" sizes="auto, (max-width: 1012px) 100vw, 1012px" /></p>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the Citalid overview of the</p>
<p style="text-align: center;">Russio-Ukrainien conflit’s cyber aspect</p>
<p style="text-align: center;">(click on the picture)</p>
<p><a href="https://citalid.com/blog/dynamiques-cyber-et-geopolitique-de-la-guerre-russo-ukrainienne-partie-2/"><img loading="lazy" decoding="async" class="aligncenter wp-image-18153 size-medium" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-338x191.png" alt="" width="338" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-768x434.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-800x450.png 800w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid.png 1083w" sizes="auto, (max-width: 338px) 100vw, 338px" /></a></p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/">CDT Watch – May 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Identity card of the Spring4Shell vulnerability by CERT-W</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/#respond</comments>
		
		<dc:creator><![CDATA[Jean Marsault]]></dc:creator>
		<pubDate>Tue, 12 Apr 2022 17:32:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[EthicalHacking]]></category>
		<category><![CDATA[IDCard]]></category>
		<category><![CDATA[Sping4Shell]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17942</guid>

					<description><![CDATA[<p>    Overview Spring is a lightweight opensource application framework for Java. It allows for easy development and testing of Java applications. Spring is used to create Java enterprise applications. It provides means to build applications and supports different scenarios....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/">Identity card of the Spring4Shell vulnerability by CERT-W</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p> </p>
<p> </p>
<h1>Overview</h1>
<p>Spring is <b>a lightweight opensource application framework for Java</b>. It allows for easy development and testing of Java applications. <br />Spring is used to create Java enterprise applications. It provides means to build applications and supports different scenarios. <br />A new vulnerability was found in Spring Core leading to a <b>Remote Code Execution</b>.</p>
<p>On March 31st, a CVE was released: <b>Spring4Shell</b> (<a href="https://tanzu.vmware.com/security/cve-2022-22965">CVE-2022-22965</a>)</p>
<p><img loading="lazy" decoding="async" class=" wp-image-17724 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping.png" alt="" width="719" height="405" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping.png 1147w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image2sping-800x450.png 800w" sizes="auto, (max-width: 719px) 100vw, 719px" /></p>
<h1>Exploitability</h1>
<h2><b>Prerequisites</b></h2>
<p>/ JDK9.0 or higher</p>
<p>/ Spring Framework <b>5.3.0 to 5.3.17 </b>or <b>5.2.0 to 5.2.19</b> &amp; older versions</p>
<p>/ Apache Tomcat as the servlet container</p>
<p>/ <i>Spring-</i><i>webmvc</i> or <i>spring-</i><i>web</i><i>flux</i> dependency</p>
<p>/ Packaged as a traditional WAR</p>
<h2 style="text-align: left;"><b>Risks </b></h2>
<p>Once all prerequisites are met, the Spring4Shell exploit allows for <b>unauthenticated Remote Code Execution on the vulnerable host</b>. This initial access may lead to further harmful infection steps by attackers.</p>
<p>A list of applications and vendors that have published a statement indicating if their product was affected is available:</p>
<p><a href="https://www.kb.cert.org/vuls/id/970766">https://www.kb.cert.org/vuls/id/970766</a></p>
<h2 style="text-align: left;"><b>Difficulty</b></h2>
<p>Many researchers are still sceptical as to how achievable this exploit is. It is now clear that due to the heavy prerequisites of the exploit, it should occur in <b>fewer cases than the Log4Shell exploit</b>. However, <b>once the prerequisites are met, </b>exploiting the vulnerability <b>is pretty straightforward </b>and<b> has fewer constraints </b>than Log4Shell (egress traffic is not needed).</p>
<h2 style="text-align: left;"><b>Real-world examples</b></h2>
<p>Some real-world examples meet the prerequisites. Some researchers have found that the <a href="https://spring.io/guides/gs/handling-form-submission/">Handling Form submission sample code</a> <b>provided by Spring in one of their tutorials </b>is vulnerable to the Spring4Shell exploit.</p>
<h1>Mitigations</h1>
<h2><b>Main recommendation: </b><span style="color: #800080;"><u><b>Update applications to Spring Framework 5.3.18 or 5.2.20 if possible</b></u></span></h2>
<h2><b>Manual workaround:</b></h2>
<p>This section is <b>applicable only if it is not possible to update the applications </b>as mentioned above.</p>
<p>A temporary fix may be manually applied to mitigate the possibility of the Spring4Shell exploit: the following class must be created under the project package of the application system. After making sure the class is loaded by Spring, the <b>project must be recompiled</b>. This workaround only works against exploits known at this time, it’s <b>effectiveness may not be guaranteed in the long term</b>.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-17817 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5.png" alt="" width="1858" height="285" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5.png 1858w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5-437x67.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5-71x11.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5-768x118.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/Image5-1536x236.png 1536w" sizes="auto, (max-width: 1858px) 100vw, 1858px" /></p>
<h2 style="text-align: left;"><b>Good practice:</b></h2>
<p><img loading="lazy" decoding="async" class="wp-image-17745 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/goodpract-1.png" alt="" width="274" height="319" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/goodpract-1.png 425w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/goodpract-1-164x191.png 164w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/goodpract-1-33x39.png 33w" sizes="auto, (max-width: 274px) 100vw, 274px" /></p>
<h2 style="text-align: left;"><b>Point of attention:</b></h2>
<p><span style="color: #800080;">The Spring4Shell exploit only provides command execution on the vulnerable host:</span> it allows for initial access on a server exposed to the Internet. Commands will be executed in the context of the running application. A healthy, up-to-date infrastructure, as well as a good application of the least privilege principle, may greatly mitigate Spring4Shell’s impact.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17747" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app.png" alt="" width="1894" height="82" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app.png 1894w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app-437x19.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app-71x3.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app-768x33.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/all-java-app-1536x67.png 1536w" sizes="auto, (max-width: 1894px) 100vw, 1894px" /></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/">Identity card of the Spring4Shell vulnerability by CERT-W</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/04/identity-card-of-the-spring4shell-vulnerability-by-cert-w/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – March 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 31 Mar 2022 08:11:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[front]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17670</guid>

					<description><![CDATA[<p>FOCUS TECH Conti Kill Chain SOURCES : CERT-W: FROM THE FRONT LINE The First Responder Word   READING OF THE MONTH We recommend the interview of Pompompurin, a cyber activist who’s work ranges from leaking the data of thousands of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/">CDT Watch – March 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Conti Kill Chain</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17672" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1.jpg" alt="" width="944" height="650" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1.jpg 944w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1-277x191.jpg 277w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1-768x529.jpg 768w" sizes="auto, (max-width: 944px) 100vw, 944px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17674" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2.jpg" alt="" width="945" height="654" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2-768x532.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17676" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3.jpg" alt="" width="945" height="648" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3-279x191.jpg 279w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3-768x527.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17678" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4.jpg" alt="" width="945" height="645" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4-768x524.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17680" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5.jpg" alt="" width="945" height="645" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5-768x524.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17682" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6.jpg" alt="" width="946" height="651" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6.jpg 946w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6-278x191.jpg 278w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6-768x529.jpg 768w" sizes="auto, (max-width: 946px) 100vw, 946px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17684" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7.jpg" alt="" width="945" height="646" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7-279x191.jpg 279w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7-768x525.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17686" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8.jpg" alt="" width="944" height="654" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8.jpg 944w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8-768x532.jpg 768w" sizes="auto, (max-width: 944px) 100vw, 944px" /></p>
<p style="text-align: center;"><strong>SOURCES :</strong></p>
<p><a href="https://adversary.crowdstrike.com/en-US/adversary/wizard-spider/"><img loading="lazy" decoding="async" class="aligncenter wp-image-17688 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/10.jpg" alt="" width="270" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/10.jpg 270w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/10-68x39.jpg 68w" sizes="auto, (max-width: 270px) 100vw, 270px" /></a></p>
<p><a href="https://github.com/tsale/translated_conti_leaked_comms"><img loading="lazy" decoding="async" class="aligncenter wp-image-17690 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/11.jpg" alt="" width="316" height="150" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/11.jpg 316w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/11-71x34.jpg 71w" sizes="auto, (max-width: 316px) 100vw, 316px" /></a></p>
<figure id="post-16217 media-16217" class="align-center"></figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"></figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17693" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15.jpg" alt="" width="783" height="530" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15-282x191.jpg 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15-58x39.jpg 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15-768x520.jpg 768w" sizes="auto, (max-width: 783px) 100vw, 783px" /></p>
<p> </p>
<h1 style="text-align: center;"><strong>READING OF THE MONTH</strong></h1>
<p style="text-align: center;">We recommend the interview of Pompompurin, a cyber activist who’s work ranges from leaking the data of thousands of WeLeakInfo Users to abusing the FBI&#8217;s Servers to send thousands of false emails.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17695" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/20.jpg" alt="" width="244" height="145" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/20.jpg 244w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/20-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/20-120x70.jpg 120w" sizes="auto, (max-width: 244px) 100vw, 244px" /></figure>
<p style="text-align: center;"><a href="https://dataknight.org/exclusive-interview-with-pompompurin/">The interview by Data Knight</a></p>
</figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/">CDT Watch – March 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – February 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/02/cdt-watch-february-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/02/cdt-watch-february-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Mon, 28 Feb 2022 09:00:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cyber strategy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[front]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17622</guid>

					<description><![CDATA[<p>DECRYPTION THE RISE OF INITIAL ACCESS BROKERS As seen in the underground economy edition, the cybercriminal economy relies on the professionalization and specialization of its system. Among the main actors of this ecosystem, such as the Bullet Proof Hoster or...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/02/cdt-watch-february-2022/">CDT Watch – February 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;"><span class="TextRun BCX9 SCXW140991250" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun BCX9 SCXW140991250">T</span></span><span class="TextRun BCX9 SCXW140991250" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun BCX9 SCXW140991250">HE RISE OF INITIAL ACCESS BROKERS</span></span></h2>
<p>As seen in the underground economy edition, the cybercriminal economy relies on the professionalization and specialization of its system. Among the main actors of this ecosystem, such as the Bullet Proof Hoster or the RaaS, the Initial Access Brokers (IAB) have become more and more crucial these last years. </p>
<p> </p>
<p><strong>What is the IAB’s role in the underground economy? </strong> </p>
<p>They are providers of victims’ access. They scan the web for vulnerabilities, send phishing e-mails or try to use brute force to get hold of the passwords of company employees, or even create persistent access in the victim’s network. Those ready-made &#8216;access&#8217; are sold on the dark market: depending on its level of quality, prices can range from $1K to $100K. <a href="https://www.borderelliptic.com/Documents/white_papers/initial-access-brokers-report.pdf">The average selling price of initial access to a network is $7,100.</a> Price is based on the organization’s revenue, type of access sold, and number of devices accessible. For example, Access to <u>an </u><a href="https://ke-la.com/all-access-pass-five-trends-with-initial-access-brokers/">Australian company with 500 million USD in revenue</a> that enables an attacker with “admin” level of privileges has been offered for 12 BTC, and access to a <a href="https://ke-la.com/all-access-pass-five-trends-with-initial-access-brokers/">Mexican government body for 100,000 USD.</a> </p>
<p>The market of corporate initial access grew by almost 16% in H2 2020–H1 2021, from $6,189,388 to $7,165,387<u>. </u><a href="https://securitydelta.nl/images/Group_IB_presents_report_on_trending_crimes_Europe_PR1.pdf">The number of offers to sell access to companies almost tripled over the review period: from 362 to 1,099. </a> The geography of initial access brokers’ operations has also expanded: if the US-based companies are <u>the most popular victims (</u><a href="https://securitydelta.nl/images/Group_IB_presents_report_on_trending_crimes_Europe_PR1.pdf">30% in 2021), the European companies access sold was multiplied by three between 2019 and 2021. </a>French companies were the most popular lot for sellers of <a href="https://securitydelta.nl/images/Group_IB_presents_report_on_trending_crimes_Europe_PR1.pdf">access to compromised networks – they accounted for 20% of all victim companies in 2021 in Europe, followed by the UK (18%).</a> </p>
<p>Finding and selecting access opportunities represent an essential but very time-consuming piece of the current “ransomware business model”. By monetizing this activity, the IABs are offering a huge advantage of time and energy for the buyers, who can select from a menu of options, picking victims based on their revenue, country, and sector, as well as the type of remote access being offered. </p>
<p> </p>
<p><strong>What kind of access are we talking about?</strong> </p>
<p>One of the main trends of the IAB market is the diversification of access Grows. If RDP and VPN are still the most common offer, new attack vectors such as access to VMWare’s ESXi servers have become quite popular. </p>
<p>According to <a href="https://www.techrepublic.com/article/initial-access-brokers-how-are-iabs-related-to-the-rise-in-ransomware-attacks/#:~:text=Initial%20access%20brokers%20are%20cybercriminals,protect%20your%20business%20from%20IABs.&amp;text=Ransomware%20attacks%20have%20increased%20seriously,vertical%20of%20the%20corporate%20world">several types of research</a>, the kind of access mostly sold are   </p>
<ul>
<li><strong>Active Directory credentials</strong>: domain administrator access is one of the most valuable access since it allows the attacker to distribute malware all over the network immediately.  </li>
<li><strong>Initial Network Access (RDP, VPN, SSH)</strong>: <strong>:</strong> is one the most common access sold since it is a very popular protocol among remote workers to access their corporate resources. One of the methods used by the IAB is to launch massive scans for RDP servers all around the internet and try to brute force it. </li>
<li><strong>Web shell access:</strong> some IABs set up web shells on compromised web servers and sell access to it. </li>
<li><strong>Admin account on CMS (WordPress, PHP)</strong><strong>: </strong>they provide access to web hosting content (including payment solutions and credit card details)  </li>
<li><strong>Admin account on virtualization machines and root access on Linux servers</strong>: the sale of root access to VMware ESXi increased significantly and some attacker’s group contains code that specifically targets those systems. </li>
<li><strong>Remote Monitoring and Management access</strong>: offer elevated permissions into several machines of the network, making it interesting data for IABs to sell. </li>
</ul>
<p>According to the IAB, the services can include more stolen data, such as information on the financial health of the targeted victim, to help the attacker set the highest realistic price for the ransom.  </p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17630" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/premiere-image.png" alt="" width="627" height="423" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/premiere-image.png 627w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/premiere-image-283x191.png 283w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/premiere-image-58x39.png 58w" sizes="auto, (max-width: 627px) 100vw, 627px" /></p>
<p> </p>
<p><strong>What does that mean for me?</strong> </p>
<p>The rise of the IABs activity is, among other things, a direct consequence of the mass shift to remote work and an increase of exposed remote services, (RDP, SSH…) and of the adoption of cloud applications increase. As seen; the main kinds of access sold relies on several vulnerabilities that can be corrected with standard cybersecurity measures: utilize strong passwords, enable 2FA when possible, admins and user awareness, frequent account review… </p>
<p>Besides, the IABs have become a keystone of the current cybercriminal system. Which means they are an interesting indicator to look at to monitor the criminal activity and the risk to become a target. Especially in the case of a mature actor, setting up <a href="https://www.borderelliptic.com/Documents/white_papers/initial-access-brokers-report.pdf">monitoring programs across surface-, deep-, and dark-web forums and marketplaces, to detect IABs offering can provide relevant information to prioritize defense actions and prepare against potential attacks.</a></p>
<p> </p>
<figure id="post-16217 media-16217" class="align-center"></figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"></figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17844" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/02/Image1.png" alt="" width="627" height="401" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/02/Image1.png 627w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/02/Image1-299x191.png 299w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/02/Image1-61x39.png 61w" sizes="auto, (max-width: 627px) 100vw, 627px" /></p>
<p> </p>
<h1 style="text-align: center;"><strong>READING OF THE MONTH</strong></h1>
<p style="text-align: center;">We recommend the Cisco Almanac for 2022:  </p>
<p style="text-align: center;">“2022 Cybersecurity Almanac: 100 Facts, Figures, Predictions and Statistics” </p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17634" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/trois.png" alt="" width="627" height="421" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/trois.png 627w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/trois-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/trois-58x39.png 58w" sizes="auto, (max-width: 627px) 100vw, 627px" /></figure>
<p style="text-align: center;"><a href="https://cybersecurityventures.com/cybersecurity-almanac-2022/">2022 Cybersecurity Almanac</a> </p>
<p> </p>
</figure>
<h1 style="text-align: center;"><strong>UPDATE ON THE UK NATIONAL CYBER STRATEGY</strong></h1>
<p>The UK’s National Cyber Strategy transmits a more ‘proactive’ stance to cyber power with a commitment to a ‘whole of society’ approach. The new strategy is supported by £2.6 billion investment seeing a 26.9% percent increase in comparison to previous strategy.</p>
<p>It is structured in five pillars: UK Cyber Ecosystem, Cyber Resilience, Technology advantage, Global leadership and finally Countering threats with 53 action plans. The plans aim to improve intel sharing platforms to truly &#8216;defend as one&#8217; with a new Govt Cyber Coordination Centre (GCCC). Supporting industrial partners and strengthening business regulations through govt levers and enhance the nation&#8217;s cyber structure and skills.</p>
<p style="text-align: center;"><strong>Access the summary from the UK office </strong><a href="https://digiplace.sharepoint.com/:p:/s/WOP-CDT-DEVELOPMENT/Eb1agzbiwRdGsmfxEGoRL1EB0N2VvP0qNbL2U7CQfK_z6A?e=LtzU2U"><strong>here</strong></a><strong>!</strong></p>
<p> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/02/cdt-watch-february-2022/">CDT Watch – February 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/02/cdt-watch-february-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch &#8211; January 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 28 Jan 2022 09:47:35 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[sysjoker]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17540</guid>

					<description><![CDATA[<p>TECH FOCUS SysJoker: Windows Version To produce this tech focus, we used data from: New SysJoker Backdoor Targets Windows, Linux, and macOS &#8211; Intezer CERT-W: FROM THE FRONT LINE The First Responder Word Reading Of The Month To learn more about...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/">CDT Watch &#8211; January 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>TECH FOCUS</strong></h1>
<h2 style="text-align: center;">SysJoker: Windows Version</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17542" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10.png" alt="" width="945" height="268" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10-437x124.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10-768x218.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17554" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17.png" alt="" width="945" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-437x127.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-768x223.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17548" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14.png" alt="" width="945" height="268" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14-437x124.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14-768x218.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17550" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15.png" alt="" width="945" height="307" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15-437x142.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15-768x249.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17552" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16.png" alt="" width="945" height="276" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16-768x224.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17554" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17.png" alt="" width="945" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-437x127.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-768x223.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18.png" alt="" width="945" height="271" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18-437x125.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18-768x220.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17558" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19.png" alt="" width="945" height="269" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19-437x124.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19-768x219.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17560" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20.png" alt="" width="945" height="267" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20-768x217.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17562" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21.png" alt="" width="945" height="292" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21-437x135.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21-768x237.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17564" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22.png" alt="" width="945" height="321" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22-437x148.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22-768x261.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17566" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23.png" alt="" width="945" height="54" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23-437x25.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23-71x4.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23-768x44.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17568" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24.png" alt="" width="945" height="266" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24-768x216.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17570" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25.png" alt="" width="945" height="276" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25-768x224.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17572" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26.png" alt="" width="945" height="280" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26-437x129.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26-768x228.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p style="text-align: center;"><em>To produce this tech focus, we used data from:</em></p>
<p style="text-align: center;"><a href="https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/"><em>New SysJoker Backdoor Targets Windows, Linux, and macOS &#8211; Intezer</em></a></p>
<figure id="post-16217 media-16217" class="align-center"></figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"></figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17577" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1.jpg" alt="" width="783" height="552" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1-271x191.jpg 271w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1-55x39.jpg 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1-768x541.jpg 768w" sizes="auto, (max-width: 783px) 100vw, 783px" /></p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about the main trends anticipated by Sophos for cybersecurity in 2022, it is here:</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-17579" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/sophros.jpg" alt="" width="205" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/sophros.jpg 412w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/sophros-255x191.jpg 255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/sophros-52x39.jpg 52w" sizes="auto, (max-width: 205px) 100vw, 205px" /></figure>
<p style="text-align: center;"><a href="https://www.sophos.com/fr-fr/medialibrary/pdfs/technical-papers/sophos-2022-threat-report.pdf">Interrelated</a><a href="http://Interrelated threats target an interdependent world, Sophos" data-wplink-url-error="true"> threats target an interdependent world, Sophos</a></p>
</figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/">CDT Watch &#8211; January 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch &#8211; December 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 30 Dec 2021 16:46:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[log4shell]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17506</guid>

					<description><![CDATA[<p>THE ROLE OF DECRYPTION TOOL AGAINST THE RANSOMWARE THREAT The ransomware threat is increasing continuously and is now considered a national threat for countries, such as the US, France, or the UK.  Last summer, the Virtual System Administrator (VSA) edited...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/">CDT Watch &#8211; December 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;"><strong>THE ROLE OF DECRYPTION TOOL AGAINST THE RANSOMWARE THREAT</strong></h2>
<table>
<tbody>
<tr>
<td width="627">
<p>The ransomware threat is increasing continuously and is <a href="https://searchsecurity.techtarget.com/news/252507290/Ransomware-Has-the-US-reached-a-tipping-point">now considered a national threat for countries</a>, such as the <a href="https://www.europol.europa.eu/newsroom/news/13-countries-join-global-fight-against-ransomware-0">US, France, or the UK.</a> </p>
<p>Last summer, the Virtual System Administrator (VSA) edited by KASEYA in the US has been exploited by REvil, impacting the company and many of its international clients. In this case, <a href="https://www.washingtonpost.com/national-security/ransomware-fbi-revil-decryption-key/2021/09/21/4a9417d0-f15f-11eb-a452-4da5fe48582d_story.html">the FBI kept secret the decryption key for three weeks from the victims,</a> in order to protect their operation against REvil.  </p>
<p> </p>
<p><strong>What’s the purpose of a decryption tool? </strong></p>
<p>As the name suggests, decryption tools are designed to decrypt encrypted data. Often based on previous ransomware analysis, those tools use decryption keys like a password to access blocked data. Today many decryption tools are proposed online, <a href="https://www.nomoreransom.org/fr/decryption-tools.html">sometimes even for free, providing a quick solution in case of known ransomware</a>.</p>
<p>Let’s consider a company ransomed. Following the criticality of the encrypted data, the company will have to choose between paying the ransom or, in case they are prepared, launching their recovery plan. This will imply rebuilding their infrastructure based on previous saves if they are still accessible which is never a trivial assumption. Paying the ransom represents an even less reliable solution to recover a safe and complete information system.</p>
<p>The decryption tool could be an alternative option to recover the data, with advantages such as being a widely available, affordable, and quick solution. The No More Ransom project launched by the National High Tech Crime Unit of the Netherlands&#8217; police, Europol&#8217;s European Cybercrime Centre, Kaspersky, and McAfee now make available 121 free ransomware decryption tools that can decrypt 151 ransomware families. <a href="https://blog.barracuda.com/2021/10/05/decryption-tool-controversy-erupts/">More than six million ransomware victims have used those tools to recover encrypted files.</a></p>
<p>However, a decryption tool can be developed only for the ransomware containing vulnerabilities. If a ransomware is 100% correctly coded, there is no vulnerability to exploit and no decryption key to be developed. Therefore, the decryption tool is a solution only for a certain type of ransomware. </p>
<p>Moreover, this option is safe only when proposed by a reliable editor. Many fake decryption tools used as scamming vectors are proposed for free online. Besides, the ransomware being in constant evolution, the decryption tools have to follow the updates to not be rapidly irrelevant.</p>
<p> </p>
<p><strong>The controversy of the decryption tools publication </strong></p>
<p>Decryption keys can be seen as ransomware vulnerabilities. In the same way that vulnerabilities are patched when discovered, when a decryption key is found, criminals patch their ransomware to make it more effective. The decryption key becomes irrelevant for the next victims. </p>
<p>Months before the Colonial Pipelines attacks, two searchers had found a decryption key to help DarkSide victims to recover and chose to not share it. But BitDefender discovered the key as well and published it online, alerting the victims, as well as the attackers. The day after this publication, DarkSide publicly informed they have corrected the problem and <a href="https://www.technologyreview.com/2021/05/24/1025195/colonial-pipeline-ransomware-bitdefender/">even address its “Special thanks to BitDefender for helping fix our issues. This will make us even better</a>”. </p>
<p>This is not an isolated case. Earlier this year, a Spanish searcher found and developed a decryption tool for the Avaddon ransomware. He published it online on GitHub with an explanation about how to use its tool. As in the case of DarkSide, <a href="https://www.lemondeinformatique.fr/actualites/lire-quand-la-publication-d-un-decrypteur-renforce-le-ransomware-avaddon-81965.html">this information was shared publicly, available for the victims as well as the ransomware developers, who corrected the vulnerabilities.</a> </p>
<p>In the KASEYA case, this decryption key was kept by the FIB because its publication would hinder an offensive cyber operation against the REvil gang. This implied letting victims such as schools and hospitals deal with the problem without sharing with them a solution, in order to reach the attackers. The operation didn&#8217;t happen immediately, as, in the same month, websites run by the REvil ransomware gang suddenly became inaccessible. </p>
<p>BreachQuest CTO Jake Williams called the situation a classic case of an intelligence gain/loss assessment. He pointed out that the direct financial damage was almost certainly larger than the FBI believed, but <a href="https://www.zdnet.com/article/fbi-decision-to-withhold-kaseya-ransomware-decryption-keys-stirs-debate/">“on the other hand, releasing the key solves an immediate need without addressing the larger issue of disrupting future ransomware operations</a>”. </p>
<p> </p>
<p><strong>Decryption tools: a partial solution</strong></p>
<p>Outside of the debate on the necessity to publish them, the crisis management interventions of the W-CERT pointed out that, even if helpful, the decryption tools are not the ultimate and perfect solution in a ransomware attack. </p>
<p>Indeed, decryption tools are only usable for a limited subset of existing ransomware, where encryption mechanisms were not created using state-of-the-art security. Even if the related ransomware attack falls under this case, which would mean the affected data will be able to get recovered safely, the attacked company still has to tackle the biggest issue of such an attack, meaning rebuilding at the very least the core of the information system that got compromised. Relying on decryption tools only to face the ransomware threat is far from being a complete and reliable solution.</p>
</td>
</tr>
</tbody>
</table>
<figure id="post-16217 media-16217" class="align-center">
<p style="text-align: center;"> </p>
</figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center">
<figure id="post-16369 media-16369" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17508" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond.jpg" alt="" width="783" height="486" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-63x39.jpg 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-768x477.jpg 768w" sizes="auto, (max-width: 783px) 100vw, 783px" /></figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17510" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first.jpg" alt="" width="783" height="425" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-352x191.jpg 352w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-768x417.jpg 768w" sizes="auto, (max-width: 783px) 100vw, 783px" /></p>
<p style="text-align: center;">For more information for vulnerability detection and remediation, contact Wavestone CERT-W!</p>
</figure>
</figure>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about the evolution of cybercrime, we recommend reading the <em>Internet Organized Crime Threat Assessment 2021</em> of Europol. This report focuses on changes and developments of cybercrime threats during the last 12 months.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-17512 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock.jpg" alt="" width="325" height="152" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock.jpg 325w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock-71x33.jpg 71w" sizes="auto, (max-width: 325px) 100vw, 325px" /></figure>
<p style="text-align: center;"><a href="https://www.europol.europa.eu/cms/sites/default/files/documents/internet_organised_crime_threat_assessment_iocta_2021.pdf">Internet Organized Crime Threat Assessment 2021, Europol</a></p>
</figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/">CDT Watch &#8211; December 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch &#8211; November 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 08:50:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17399</guid>

					<description><![CDATA[<p>FOCUS TECH File Obfuscation Discover Cobalt Strike capabilities with the technical zoom of the month: To learn more about the given malwares: Cobalt Strike Training videos CERT-W: FROM THE FRONT LINE The First Responder Word We recommend the 2021 Benchmark...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/">CDT Watch &#8211; November 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">File Obfuscation</h2>
<p style="text-align: center;">Discover Cobalt Strike capabilities with the technical zoom of the month:</p>
<figure id="post-16383 media-16383" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17400" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1.png" alt="" width="771" height="456" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1.png 771w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-323x191.png 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-768x454.png 768w" sizes="auto, (max-width: 771px) 100vw, 771px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17402" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2.png" alt="" width="770" height="442" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2.png 770w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-333x191.png 333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-768x441.png 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17404" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3.png" alt="" width="772" height="442" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3.png 772w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-768x440.png 768w" sizes="auto, (max-width: 772px) 100vw, 772px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17406" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4.jpg" alt="" width="776" height="451" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4.jpg 776w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-329x191.jpg 329w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-768x446.jpg 768w" sizes="auto, (max-width: 776px) 100vw, 776px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17408" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5.jpg" alt="" width="777" height="458" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5.jpg 777w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-324x191.jpg 324w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-768x453.jpg 768w" sizes="auto, (max-width: 777px) 100vw, 777px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17410" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6.png" alt="" width="781" height="447" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6.png 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-768x440.png 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<figure id="post-16383 media-16383" class="align-center"></figure>
<p style="text-align: center;"><strong>To learn more about the given malwares:</strong></p>
<figure id="post-16217 media-16217" class="align-center">
<figure id="post-16385 media-16385" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-17412" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more.png" alt="" width="289" height="158" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more.png 223w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more-71x39.png 71w" sizes="auto, (max-width: 289px) 100vw, 289px" /></figure>
<p style="text-align: center;"><a href="https://www.cobaltstrike.com/training">Cobalt Strike Training videos</a></p>
</figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center">
<figure id="post-16369 media-16369" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17420" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10.jpg" alt="" width="781" height="523" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10.jpg 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-285x191.jpg 285w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-58x39.jpg 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-768x514.jpg 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<p style="text-align: center;">We recommend the <em>2021 Benchmark on cybersecurity incidents</em> which reviews the interventions of the CERT-W carried out between September 2020 and October 2021. This Benchmark provides keys to understanding the security issues and a snapshot of current cybersecurity threats in France.</p>
</figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17416" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8.png" alt="" width="222" height="122" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8.png 222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8-71x39.png 71w" sizes="auto, (max-width: 222px) 100vw, 222px" /></p>
<p style="text-align: center;"><u><a href="https://uk.wavestone.com/en/insight/cyberattacks-in-2021-ransomwares-still-threat-n1/">CERT-W’s 2021 Benchmark on cybersecurity incidents </a></u></p>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about Conti, one of the most dangerous Ransomware, we recommend reading the <em>Conti Ransomware Group In-Depth Analysis </em>of Prodaft. According to Prodaft, this report will show you how the gang works with details obtained by their team who accessed Conti’s infrastructure.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17418" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9.png" alt="" width="222" height="122" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9.png 222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9-71x39.png 71w" sizes="auto, (max-width: 222px) 100vw, 222px" /></figure>
<p style="text-align: center;"><a href="https://www.prodaft.com/m/reports/Conti_TLPWHITE_v1.6_WVcSEtc.pdf">Conti Ransomware Group In-Depth Analysis by Prodaft</a></p>
</figure>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/">CDT Watch &#8211; November 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Newsletter CERT-W, from the front line &#8211; Summer 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/09/newsletter-cert-w-from-the-front-line-summer-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/09/newsletter-cert-w-from-the-front-line-summer-2021/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Mon, 13 Sep 2021 15:14:39 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Newsletter CERT]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">http://riskinsight-prepro.s189758.zephyr32.atester.fr/?p=16743</guid>

					<description><![CDATA[<p>DECRYPTION The underground economy of the ransomware In recent years the products of the underground economy have evolved quickly. Cyber criminals now offer services for others to purchase, the most popular being: Ransomware-as-a-service (RaaS). Let’s pretend you are a hacker...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/newsletter-cert-w-from-the-front-line-summer-2021/">Newsletter CERT-W, from the front line &#8211; Summer 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure id="post-16207 media-16207" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16207" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png" alt="" width="1621" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png 1621w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-768x216.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-1536x431.png 1536w" sizes="auto, (max-width: 1621px) 100vw, 1621px" /></figure>
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">The underground economy of the ransomware</h2>
<p>In recent years the products of the underground economy have evolved quickly. Cyber criminals now offer services for others to purchase, the most popular being: <strong>Ransomware-as-a-service (RaaS).</strong></p>
<p><strong>Let’s pretend you are a hacker</strong> aiming to launch a successful ransomware attack. Only, you are quite new to the business. What do you think you need? A very sophisticated level of coding and development skills? Not anymore. The whole underground economy of RaaS can provide you with every necessary element to conduct your attack, from the access credentials to the mixers helping you to launder your gains.</p>
<p><strong>What do I need for my ransomware attack? </strong></p>
<p><strong>Need #1</strong>&nbsp;<strong>– </strong><strong>Enter my target’s network.</strong> In order to do so, you need to acquire access to the victim’s network: your first providers are the&nbsp;<strong>initial access brokers (IABs)</strong>&nbsp;or&nbsp;<strong>botmasters.</strong></p>
<p>They are specialized in vulnerability exploit. They identify the flaws through massive phishing campaigns and/or scans and then <strong>access the system. </strong>Once inside, <strong>they set up remote persistent access&nbsp;</strong>to the target’s network. <a href="https://ke-la.com/all-access-pass-five-trends-with-initial-access-brokers/">The botmasters then sell you the access: depending on its level of quality, prices can range from $1K to $100K (seen for a Mexican government body). The average price for network access in 2020 was $5,400.</a> The botmaster’s services also include information on the financial health of the targeted victim, to help the attacker set the highest realistic price for the ransom</p>
<p><strong>Need #2</strong>&nbsp;–&nbsp;<strong>Anonymous</strong> <strong>infrastructure to host my hacking tools and store my data</strong><strong>. </strong>The second actor of the chain is the&nbsp;<strong>bulletproof hoster</strong>, <a href="https://www.recordedfuture.com/bulletproof-hosting-services/">providing you with infrastructure-as-a-service, including anonymization services. The subscription can go from $5 per month to any price.</a></p>
<p><strong>Need #3 – A ransomware to encrypt my victim’s files! </strong></p>
<p>Now the main part: where can you find a ransomware? The most popular way is to subscribe to a&nbsp;<strong>RaaS platforms</strong>, offering 4 main services:</p>
<ul>
<li><strong>Provide necessary information</strong>: potential victims, their financial status, security level…</li>
<li>The&nbsp;<strong>ransomware: </strong>the malicious code&nbsp;and a tool kit to facilitate the attack</li>
<li><strong>Negotiation service</strong>&nbsp;(including support to collect the ransom)</li>
<li><strong>Money laundering service</strong></li>
</ul>
<p>Other services are offered, according to what you are ready to pay. <a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2021/05/11121219/Ransomware_world_in_2021_08.png">Here</a> is an example of different price subscriptions and services on a RaaS platform. <a href="https://cybersecurityventures.com/whos-buying-and-selling-ransomware-kits-on-the-dark-web/">It can go from $100 to $84,000 (Maze).</a></p>
<p><strong>Where is the money going? </strong></p>
<p><strong>Need #4 – Clean my money! </strong>Once the attack is successful, the people in charge of <strong>the money laundering</strong> and<strong> money mules </strong>take the stage.</p>
<p><a href="https://media.threatpost.com/wp-content/uploads/sites/103/2021/04/19080601/0354039421fd7c82eb4e1b4a7c90f98e.pdf">After a payment to the perpetrator’s wallet is made, money is then dispersed and mixed across numerous wallets, to provide anonymity.</a> This <strong>bitcoin mixing</strong> through multiple other wallets makes the payment tracing quite difficult. In the Colonial Pipeline case, <a href="https://www.coindesk.com/colonial-pipeline-paid-almost-5m-crypto-ransom-soon-after-attack-report">the wallet received the 75 BTC from them, mixed with 57 payments from 21 different wallets.</a> However, this case has proven that <strong>the tracing is not insurmountable.</strong> No matter how many times the bitcoins are moved, ultimately it has to go through cryptocurrency trading platforms (such as BTC-E) and be cashed out at exchange points.</p>
<p><a href="https://www.elliptic.co/blog/buried-treasure-criminals-to-go-to-extreme-lengths-to-cash-out-crypto">Recently, the situation involves global anti-money laundering (AML) regulators armed with blockchain sleuthing tools to trace and screen transactions, making the cash-out process harder to go unnoticed</a>. To face this upgrade, cybercriminals can use a system described as “<strong>The Treasure Man”</strong>. You can find and hire them on darknet marketplaces (such as Hydra). They will <strong>cash-out your gains and hide them – physically &#8211; </strong>for you to pick up. <a href="https://www.ft.com/content/4169ea4b-d6d7-4a2e-bc91-480550c2f539">“<em>They bury it underground or hide it behind a bush, and they will tell you the coordinates. There is a whole profession</em>” (Elliptic)&nbsp;</a></p>
<p><strong>Who are the people behind the RaaS platforms? </strong></p>
<p>RaaS platforms are based on&nbsp;<strong>very organized and structured groups</strong>&nbsp;such as SMEs. REvil (one of the biggest RaaS) indicated having <u>a </u><u><a href="https://www.cyjax.com/2021/07/09/revilevolution/">team of 10 developers and systems admins</a></u>, besides their project managers. To recruit the best experts, <strong>the platform&#8217;s leaders choose their employees after a challenging recruitment process. </strong>The candidates prove themselves through job interviews, hacking exercises and agree to an “ethical charter”. <a href="https://cybernews.com/security/how-we-applied-to-work-with-ransomware-gang/">You can read here the undercover investigation of journalists who followed the process to be hired as hackers by a RaaS.</a></p>
<p>The <strong>subscribers</strong> or <strong>affiliates</strong> of a RaaS platform (in this story, that’s you) are “only” in charge of the intrusion, the data collect and the ransomware deployment on the victim network. The affiliates usually pocket <strong><u>between</u></strong><u>&nbsp;</u><u><a href="https://media.threatpost.com/wp-content/uploads/sites/103/2021/04/19080601/0354039421fd7c82eb4e1b4a7c90f98e.pdf"><strong>60</strong> <strong>and 80 % of the ransom</strong>, with the rest going into the operators’ coffers.</a></u> The RaaS platform of&nbsp;Netwalker requires 20% of the ransom, but other groups can ask 70%. <u>REvil recently announced being&nbsp;</u><u><a href="https://www.youtube.com/watch?v=ZyQCQ1VZp8s&amp;ab_channel=RussianOSINT">paid at least 100,000,000$ per year.</a></u><u>&nbsp;</u></p>
<p><strong>No honor among thieves?</strong></p>
<p>If the RaaS market is a very well-organized business model, it still is the underground economy we are talking about.&nbsp;It’s not because you are a potential RaaS client, that you are in a safe place.</p>
<p>The two&nbsp;<a href="https://www.sciencedirect.com/science/article/pii/S0167404820300468">years of research on the darknet of Håkon Melanda</a>&nbsp;have shown that&nbsp;<strong>most of the RaaS items sold on the darknet markets are frauds</strong>, where the buyers either get rubbish or ransomware that redirects the whole payment somewhere else than the buyer’s wallet. If the authentic RaaS vendors are indeed taking the lion’s share in terms of gains,&nbsp;the others are not doing bad either by <strong>targeting naive cybercriminals.&nbsp;</strong></p>
<p>If the RaaS distribution process significantly facilitated the ransomware attack for more people, it does not mean it is accessible to every internet user. Not only employees of a RaaS platform need to have a strong resume to be hired, but&nbsp;the <strong>affiliates too have to prove their skills before being allowed to subscribe</strong> to a RaaS service.&nbsp;<a href="https://media.threatpost.com/wp-content/uploads/sites/103/2021/04/19080601/0354039421fd7c82eb4e1b4a7c90f98e.pdf">Well-established RaaS groups such as NetWalker are known to be rather picky and carefully check any new affiliate with interviews and a short trial period</a>. The basic requirement for an affiliate candidate is &#8211; at least &#8211; to demonstrate experience in carrying out network intrusions and lateral movement.</p>
<p><strong>Conclusion: The Circle of money</strong></p>
<p>This very well-organized and profitable economic system yearns for one thing: to be even more profitable, like any business. <strong>To hire better experts, with better tools and launch more sophisticated attacks to collect more money</strong>. How can they develop themselves? <strong>Through the ransom paid by previous attacks</strong>. According to <a href="https://searchsecurity.techtarget.com/news/252503170/DarkSide-ransomware-funded-by-cybercriminal-investors">Ondrej Krehel studies, most of the largest ransomware gangs were launched with seed money from previous operations such as Darkside with Zloader.</a> <a href="https://www.fastcompany.com/90650142/ransomware-venture-capital-ecosystem-lifars">Moreover, as groups sought to diversify with new operations, members adopted a sort of <strong>venture capital</strong> structure</a>, in which one team provides funds to help another build the infrastructure and tools needed to start its operations. <strong>The more ransom that is sent to the system, the more experts will be attracted by this profitable business</strong>, <a href="https://www.lemagit.fr/actualites/252503610/Derriere-les-ransomwares-en-mode-service-Des-investisseurs">the more investors will fund it.</a></p>
<p>Besides, once a ransom is paid, the payer is identified as a “good client” by the market. <a href="https://www.cybereason.com/press/new-cybereason-ransomware-study-reveals-true-cost-to-business">Cybereasons studies indicated that 80% of organizations that paid the ransom after a ransomware attack were hit again.</a> <strong>When a victim pays a ransom, it does not guarantee recovery of their system, but it is for sure the best way to fund a future attack, more sophisticated, against themselves.</strong></p>
<p>&nbsp;</p>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16367" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/image1.jpg" alt="" width="940" height="493"></figure>
</figure>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The CTI Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center">
<figure id="post-16369 media-16369" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16369" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/image2.jpg" alt="" width="940" height="572"></figure>
</figure>
</figure>
<h1>&nbsp;</h1>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">File Obfuscation</h2>
<p>&nbsp;</p>
<figure id="post-16215 media-16215" class="align-center">
<figure id="post-16371 media-16371" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16371" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/1.png" alt="" width="889" height="251"></figure>
<figure id="post-16373 media-16373" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16373" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/2.png" alt="" width="918" height="279"></figure>
<figure id="post-16375 media-16375" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16375" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/3.png" alt="" width="922" height="531"></figure>
<figure id="post-16377 media-16377" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16377" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/4.png" alt="" width="922" height="531"></figure>
<figure id="post-16379 media-16379" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16379" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/5.png" alt="" width="917" height="552"></figure>
<figure id="post-16381 media-16381" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16381" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/6.png" alt="" width="915" height="806"></figure>
</figure>
<figure id="post-16383 media-16383" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-16383" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/7.png" alt="" width="830" height="243"></figure>
<p style="text-align: center;"><strong>To learn more about the given malwares:</strong></p>
<figure id="post-16217 media-16217" class="align-center">
<figure id="post-16385 media-16385" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16385" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/8.jpg" alt="" width="762" height="198"></figure>
</figure>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">Instead of a report, we recommend for the reading of the summer the interview of BlackMatter, who has his heart set on explaining how there are taking the best from REvil and DarkSide, their business model and their guidelines of victims’ target.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16387" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/9.jpg" alt="" width="289" height="196"></figure>
</figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/newsletter-cert-w-from-the-front-line-summer-2021/">Newsletter CERT-W, from the front line &#8211; Summer 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/09/newsletter-cert-w-from-the-front-line-summer-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Newsletter CERT-W, from the front line &#8211; June 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 24 Jun 2021 13:39:44 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[front line]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=16204</guid>

					<description><![CDATA[<p>DECRYPTION CYBER CRIMINAL NETWORK DISMANTELING The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them. What is&#160;Emotet?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-16207 media-16207" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16207" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png" alt="" width="1621" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png 1621w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-768x216.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-1536x431.png 1536w" sizes="auto, (max-width: 1621px) 100vw, 1621px" /></figure>
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">CYBER CRIMINAL NETWORK DISMANTELING</h2>
<p><strong>The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them.</strong></p>
<p><strong>What is&nbsp;Emotet?</strong></p>
<p>Emotet&nbsp;was originally a&nbsp;<strong>banking trojan,</strong> stealing emails and contact list, retrieving&nbsp;passwords on navigators and systems, spreading within the infected network.&nbsp;In&nbsp;2019,&nbsp;Emotet&nbsp;lost its banking module and became a&nbsp;<strong>dropper</strong> of malwares. The trojan used&nbsp;a&nbsp;<a href="https://www.justice.gov/opa/pr/emotet-botnet-disrupted-international-cyber-operation"><strong>botnet of 1.6 million machines</strong></a>&nbsp; to realize phishing campaign and install itself on victims’ machines.</p>
<p><strong>Why is&nbsp;Emotet called the “king of malware”?</strong></p>
<p>At the end of 2020,&nbsp;Emotet&nbsp;was identified as&nbsp;<a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action"><strong>one of the most dangerous&nbsp;malwares</strong></a>. Additionally, being a dropper as well as a botnet,&nbsp;Emotet&nbsp;also&nbsp;served&nbsp;as a&nbsp;<strong>front&nbsp;door</strong>&nbsp;to many other malwares.&nbsp;It&nbsp;was used to drop malicious payloads directly onto the victims’ assets: for example,&nbsp;TrickBot&nbsp;was dropped onto the targeted machine which in turn, would drop&nbsp;<strong>Ryuk&nbsp;or Conti ransomware</strong>. According to Checkpoint Research,&nbsp;Emotet&nbsp;was at the top of the Global Threat Index in October 2020 and was linked to a&nbsp;<a href="https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/"><strong>wave of ransomware attacks</strong></a>.&nbsp;According to CISA, the U.S. Cybersecurity &amp; Infrastructure Security Agency,&nbsp;Emotet&nbsp;infections cost is estimated at&nbsp;<a href="https://www.kaspersky.com/resource-center/threats/emotet"><strong>$1 million per incident</strong></a><strong>.</strong></p>
<p>&nbsp;</p>
<figure id="post-16210 media-16210" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16210" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png" alt="" width="877" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png 877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-233x191.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-48x39.png 48w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-768x631.png 768w" sizes="auto, (max-width: 877px) 100vw, 877px" /></figure>
<p style="text-align: center;"><em>Main TA542’s customer base, “The Malware As a Service EMOTET”, ANSSI 2021</em></p>
<p>&nbsp;</p>
<p>During several months, Europol used the help of Eurojust, France, Germany, United States of America and announced their successful dismantle of the Emotet network in January 2021.</p>
<p><strong>Does this dismantling&nbsp;mean&nbsp;the end of the&nbsp;malware?</strong></p>
<p>The end of one botnet actually <a href="https://info.phishlabs.com/blog/emotet-dismantled-trickbot-zloader-and-bazarloader-step-in"><strong>led to&nbsp;the rise of several others</strong></a>, such as&nbsp;TrickBot, which even though existed since 2016, replaced Emotet as one of the most well-established&nbsp;MaaS&nbsp;(Malware as a Service) not long after the events on January.</p>
<p>This turn of events might not be so surprising, as threat actors often pivot and change their tools along the way, whether by choice or by necessity as it was the case here. Taking one malware down would only force them to use another one. Yet, what is interesting is that&nbsp;<a href="https://blogs.microsoft.com/on-the-issues/2020/10/12/trickbot-ransomware-cyberthreat-us-elections/"><strong>TrickBot&nbsp;also suffered a dismantlement of its own</strong></a>, back in October 2020. In an attempt to disrupt one of the most used distributors of ransomware, Microsoft joined forces with other security teams to take down&nbsp;TrickBot&nbsp;servers. As you may have noticed, this was months before law-enforcement took down&nbsp;Emotet, and now&nbsp;<a href="https://securityintelligence.com/posts/trickbot-survival-instinct-trickboot-version/"><strong>TrickBot&nbsp;or other versions of this malware, still lives on</strong></a>. These actions only disrupted&nbsp;TrickBot&nbsp;activities for a few days, before going back to what&nbsp;it was and even&nbsp;<strong>overtaking&nbsp;Emotet&nbsp;dominance</strong>.</p>
<p>Moreover, TrickBot&nbsp;seems to be somehow connected to the&nbsp;<strong><a href="https://www.cybereason.com/threat-alert-new-trickbot-variants">Bazar</a></strong>&nbsp;malware (BazarLoader&nbsp;and&nbsp;BazarBackdoor), as some part of its infrastructure is shared with&nbsp;TrickBot&nbsp;and both show code similarities. This new toolset is now the most seen malware used to deploy&nbsp;Ryuk&nbsp;ransomware instead of the previous&nbsp;Emotet-TrickBot-Ryuk&nbsp;or&nbsp;TrickBot-Ryuk&nbsp;chain of infection. These changes might have to do with the previously mentioned&nbsp;dismantlements, or due to a new collaboration between threat actors.</p>
<p><strong>What about the people behind these groups?</strong></p>
<p>More recently, on June 4th,&nbsp;<a href="https://www.justice.gov/opa/pr/latvian-national-charged-alleged-role-transnational-cybercrime-organization"><strong>Alla&nbsp;Witte was charged on multiple counts</strong></a> for participating in&nbsp;TrickBot&nbsp;criminal activities. Is this arrest, serving as a warning with several hundreds of years of prison if convicted, going to change cybercriminals’ operations? A few months before that, the Ukrainian authorities cooperated with the French law enforcement to conduct&nbsp;<a href="https://blog.malwarebytes.com/ransomware/2021/02/egregor-ransomware-hit-by-arrests/"><strong>an arrest against Egregor members</strong></a>, while&nbsp;<a href="https://threatpost.com/netwalker-ransomware-suspect-charged/163405/"><strong>a Canadian tied to&nbsp;Netwalker&nbsp;ransomware was charged</strong>&nbsp;</a>by the police for distributing the malware. Last year was also marked by several other arrests of cybercriminals around the world. For instance,&nbsp;<a href="https://www.zdnet.com/article/europol-arrests-hackers-behind-infinity-black-hacker-group/"><strong>the arrest of members of the Infinity Black website&nbsp;</strong></a>selling user credentials, lead to the end of the website and the group altogether. On the other hand, the arrests mentioned regarding&nbsp;Netwalker&nbsp;and Egregor seem to concern ransomware affiliates. And as the operators are still free and collaborate with other affiliates, their ransomware continues being deployed around the world.&nbsp;Alla&nbsp;Witte’s case is different since she is suspected to be a malware developer for the&nbsp;TrickBot&nbsp;Group. While her possible conviction might slightly disrupt&nbsp;TrickBot, it seems like their operations still go on, as according to <a href="https://any.run/malware-trends/trickbot">the&nbsp;any.run&nbsp;website and its malware trend tracker, the trojan was last seen on June 16th, 2021</a>. Last but not least, <a href="https://www.bleepingcomputer.com/news/security/ukraine-arrests-clop-ransomware-gang-members-seizes-servers/">some mid-tier members of the Cl0p gang may have been arrested</a> mid-June in Ukraine even though it seems no core actor behind Cl0p were apprehended.</p>
<p><strong>What could be the long-term consequences of these takedown for the cybercriminal activities?</strong></p>
<p>It’s still early to draw meaningful conclusions on the consequences for cybercriminal activities with the recent arrests. Yesterday, June 16th, at the Geneva summit, U.S. <a href="https://www.zdnet.com/article/biden-and-putin-spar-over-cybersecurity-ransomware-at-geneva-summit/"><strong>President Joe Biden met with Russian President Vladimir Putin</strong></a>. One of the hot topics of discussions was the <strong>ransomware attacks on U.S. entities from Russian soil</strong>. Biden warned Putin that United States would not tolerate any other cyber-attacks, especially on 16 critical sectors. The <a href="https://www.zdnet.com/article/ransomware-russia-told-to-tackle-cyber-criminals-operating-from-within-its-borders/"><strong>G7</strong></a> and the <a href="https://www.zdnet.com/article/nato-series-of-cyberattacks-could-be-seen-as-the-same-threat-as-an-armed-attack/"><strong>NATO</strong></a> also stated that in order not to consider cyber-attacks as armed attacks, Russia should try to identify and disrupt ransomware organizations within its borders.</p>
<p>Even with the arrests of criminal gang members and cybersecurity talks at the presidential levels, <strong>some experts say there would be no or little impact on ransomware groups that will still operate with impunity</strong>. The near future will give hints about the possible evolution of the cyber-attacks landscape. On one hand, the rising of a broader international collaboration against cyber-criminal gangs which could lead to less opportunistic and lucrative attacks. On the other hand, growing tensions between two blocks: U.S.-Europe and Russia-China with possible sanctions from either side and more cyber espionage, supply-chain or state-sponsored attacks.</p>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16228" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg" alt="" width="936" height="638" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg 936w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-768x523.jpg 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>
</figure>
<h1></h1>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Phishing</h2>
<p>Think like a cybercriminal and understand how a spear phishing campaign is built to avoid them!</p>
<p>The technical zoom of the month:</p>
<figure id="post-16215 media-16215" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16215" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png" alt="" width="973" height="1849" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png 973w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-101x191.png 101w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-21x39.png 21w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-768x1459.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-808x1536.png 808w" sizes="auto, (max-width: 973px) 100vw, 973px" /></figure>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>To learn more about this:</strong></p>
<figure id="post-16217 media-16217" class="align-center"><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish-infographic"><img loading="lazy" decoding="async" class="aligncenter wp-image-16217" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png" alt="" width="235" height="197" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png 462w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-46x39.png 46w" sizes="auto, (max-width: 235px) 100vw, 235px" /></a></figure>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the short report “APT trends report Q1 2021”, which reviews the highlight events and findings observed by the Global Research and Analysis Team at Kaspersky during the Q1 2021 around the world.</p>
<figure id="post-16219 media-16219" class="align-center"><a href="https://securelist.com/apt-trends-report-q1-2021/101967/"><img loading="lazy" decoding="async" class="aligncenter wp-image-16219" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg" alt="" width="248" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg 415w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-63x39.jpg 63w" sizes="auto, (max-width: 248px) 100vw, 248px" /></a></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter February 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 16 Mar 2021 15:00:24 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15372</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK Two French hospital under ransomware attacks Ransomware attacks struck two French hospital groups in less than a week, prompting the transfer of some patients to other facilities but not affecting care for Covid-19 patients or virus...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/">CERT-W Newsletter February 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center">
<figure id="post-14983 media-14983" class="align-center">
<figure id="post-15176 media-15176" class="align-center">
<figure id="post-15373 media-15373" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-15373" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23.png" alt="" width="761" height="239" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23.png 1498w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-437x137.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-768x241.png 768w" sizes="auto, (max-width: 761px) 100vw, 761px" /></figure>
</figure>
</figure>
</figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.euronews.com/2021/02/16/several-french-hospitals-crippled-by-cyberattacks"><span style="text-decoration: underline; color: #21a6a6;"><strong>Two French hospital under ransomware attacks</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">Ransomware attacks struck <strong style="font-family: inherit; font-size: inherit;">two French hospital groups in less than a week</strong><span style="font-family: inherit; font-size: inherit;">, prompting the transfer of some patients to other facilities but not affecting care for Covid-19 patients or virus vaccinations. </span>The two French hospitals were stricken with <strong style="font-family: inherit; font-size: inherit;">ransomware attacks,</strong><span style="font-family: inherit; font-size: inherit;"> and a third pre-emptively </span><strong style="font-family: inherit; font-size: inherit;">cut connections with an IT provider</strong><span style="font-family: inherit; font-size: inherit;">. </span>The Villefranche-sur-Saône hospital complex in France’s eastern Rhone département (administrative area) announced Monday that a cyber-attack had been detected at 4:30am local time. The attack by the crypto-virus RYUK, a kind of ransomware, &#8220;strongly impacts&#8221; the Villefranche, Tarare and Trévoux sites of the North-West Hospital.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://abcnews.go.com/US/outdated-computer-system-exploited-florida-water-treatment-plant/story?id=75805550"><span style="text-decoration: underline; color: #21a6a6;"><strong>An outdated version of Windows and a weak cybersecurity network allowed hackers to poison the Florida water treatment</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2"><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;">The hacker was able to <strong style="font-family: inherit; font-size: inherit;">use remote access software to raise the levels of sodium hydroxide</strong><span style="font-family: inherit; font-size: inherit;"> in the water from about 100 parts per million to 11,100 parts per million for a few minutes, according to investigators. The FBI&#8217;s Cyber Division on Tuesday notified law enforcement agencies and businesses to warn them about the computer vulnerabilities, which led to the Bruce T. Haddock </span><strong style="font-family: inherit; font-size: inherit;">Water Treatment Plant</strong><span style="font-family: inherit; font-size: inherit;"> in Oldsmar being hacked on Feb. 5.</span><br />
</span></span></span><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;">The plant&#8217;s computer systems were using Windows 7, which hasn&#8217;t received support or updates from Microsoft in over a year, according to the FBI.</span></span></td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://cybernews.com/news/largest-compilation-of-emails-and-passwords-leaked-free/"><span style="text-decoration: underline; color: #21a6a6;"><strong>COMB: more than 3 billion of Gmail, Hotmail, Netflix passwords have leaked</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">It’s being called <strong>the biggest breach of all time</strong> and <strong>the mother of all breaches</strong>: COMB, or the Compilation of Many Breaches, contains more than 3.2 billion unique pairs of cleartext emails and passwords. While many data breaches and leaks have plagued the internet in the past, this one is exceptional in the sheer size of it. To wit, the entire population of the planet is at roughly 7.8 billion, and this is about 40% of that.</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.europol.europa.eu/newsroom/news/ten-hackers-arrested-for-string-of-sim-swapping-attacks-against-celebrities"><span style="text-decoration: underline; color: #21a6a6;"><strong>Arrest,Ten hackers arrested after stealing over USD 100 million in cryptocurrencies by hijacking phone numbers</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">Around 10 criminals have been <strong>arrested</strong> as a result of an <strong>international investigation into a series of sim swapping attacks</strong> targeting high-profile victims in the United States. The attacks orchestrated by this criminal gang targeted thousands of victims throughout 2020, including famous internet influencers, sport stars, musicians and their families. The criminals are believed to have <strong>stolen</strong> from them over <strong>USD 100 million in cryptocurrencies</strong> after illegally gaining access to their phones.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.cert.ssi.gouv.fr/cti/CERTFR-2021-CTI-005/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">Sandworm intrusion set campaign targeting Centreon systems, impacting several French entities</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">ANSSI has been informed of <strong style="font-family: inherit; font-size: inherit;">an intrusion campaign targeting the monitoring software Centreon</strong><span style="font-family: inherit; font-size: inherit;"> distributed by the French company CENTREON which resulted in the </span><strong style="font-family: inherit; font-size: inherit;">breach of several French entities</strong><span style="font-family: inherit; font-size: inherit;">. This campaign mostly affected information technology providers, especially web hosting providers.</span><br />
On compromised systems, ANSSI discovered the presence of a backdoor in the form of a webshell dropped on several Centreon servers exposed to the internet. This campaign bears several similarities with previous campaigns attributed to the <strong>intrusion set named Sandworm.</strong></td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.zdnet.com/article/dutch-covid-19-patient-data-sold-on-the-criminal-underground/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Following Emotet and Netwalker arrest, groups of cybercriminal publicity released victim&#8217;s decrytption keys</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">Less than one month after the arrest of <strong style="font-family: inherit; font-size: inherit;">Emotet and Netwalker</strong><span style="font-family: inherit; font-size: inherit;"> networks, two cybercriminal groups known as Ziggy and Fonix announced that they were shutting down their ransomware operations and would be releasing all of the </span><strong style="font-family: inherit; font-size: inherit;">decryption keys</strong><span style="font-family: inherit; font-size: inherit;">. The groups mentioned concerns about recent law enforcement activity and guilt for encrypting victims. Ziggy ransomware admin indeed </span><strong style="font-family: inherit; font-size: inherit;">posted a SQL file</strong><span style="font-family: inherit; font-size: inherit;"> containing 922 decryption keys for encrypted victims. For each victim, the SQL file lists three keys needed to decrypt their encrypted files.</span></td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1300"><strong>CVE-2021-1300</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Cisco SD-WAN Vulnerability</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.8 CRITICAL</strong></p>
<p>Cisco is warning of multiple, critical vulnerabilities in its software-defined networking for wide-area networks (<a href="https://threatpost.com/cisco-zero-day-anyconnect-secure-patch/160988/">SD-WAN</a>) solutions for business users. One of them is this buffer-overflow flaw stems from incorrect handling of IP traffic; an attacker could exploit the flaw by sending crafted IP traffic through an affected device, which may cause a buffer overflow when the traffic is processed. Ultimately, this allows an attacker to execute arbitrary code on the underlying operating system with root privileges.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1257"><strong>CVE-2021-1257</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Cisco Digital Network Architecture CSRF Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>The flaw exists in the web-based management interface of the Cisco DNA Center, which is a centralized network-management and orchestration platform for Cisco DNA. An attacker could exploit the vulnerability by socially engineering a web-based management user into following a specially crafted link, say via a phishing email or chat. If the user clicks on the link, the attacker can then perform arbitrary actions on the device with the privileges of the authenticated user.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1647"><strong>CVE-2021-1647</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Microsoft Defender Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 7.8 HIGH</strong></p>
<p>It could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account. In its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/">CERT-W Newsletter February 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
