<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CDT - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/cdt/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/cdt/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 19 Jan 2022 16:55:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>CDT - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/cdt/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CDT Watch &#8211; December 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 30 Dec 2021 16:46:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[log4shell]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17506</guid>

					<description><![CDATA[<p>THE ROLE OF DECRYPTION TOOL AGAINST THE RANSOMWARE THREAT The ransomware threat is increasing continuously and is now considered a national threat for countries, such as the US, France, or the UK.  Last summer, the Virtual System Administrator (VSA) edited...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/">CDT Watch &#8211; December 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;"><strong>THE ROLE OF DECRYPTION TOOL AGAINST THE RANSOMWARE THREAT</strong></h2>
<table>
<tbody>
<tr>
<td width="627">
<p>The ransomware threat is increasing continuously and is <a href="https://searchsecurity.techtarget.com/news/252507290/Ransomware-Has-the-US-reached-a-tipping-point">now considered a national threat for countries</a>, such as the <a href="https://www.europol.europa.eu/newsroom/news/13-countries-join-global-fight-against-ransomware-0">US, France, or the UK.</a> </p>
<p>Last summer, the Virtual System Administrator (VSA) edited by KASEYA in the US has been exploited by REvil, impacting the company and many of its international clients. In this case, <a href="https://www.washingtonpost.com/national-security/ransomware-fbi-revil-decryption-key/2021/09/21/4a9417d0-f15f-11eb-a452-4da5fe48582d_story.html">the FBI kept secret the decryption key for three weeks from the victims,</a> in order to protect their operation against REvil.  </p>
<p> </p>
<p><strong>What’s the purpose of a decryption tool? </strong></p>
<p>As the name suggests, decryption tools are designed to decrypt encrypted data. Often based on previous ransomware analysis, those tools use decryption keys like a password to access blocked data. Today many decryption tools are proposed online, <a href="https://www.nomoreransom.org/fr/decryption-tools.html">sometimes even for free, providing a quick solution in case of known ransomware</a>.</p>
<p>Let’s consider a company ransomed. Following the criticality of the encrypted data, the company will have to choose between paying the ransom or, in case they are prepared, launching their recovery plan. This will imply rebuilding their infrastructure based on previous saves if they are still accessible which is never a trivial assumption. Paying the ransom represents an even less reliable solution to recover a safe and complete information system.</p>
<p>The decryption tool could be an alternative option to recover the data, with advantages such as being a widely available, affordable, and quick solution. The No More Ransom project launched by the National High Tech Crime Unit of the Netherlands&#8217; police, Europol&#8217;s European Cybercrime Centre, Kaspersky, and McAfee now make available 121 free ransomware decryption tools that can decrypt 151 ransomware families. <a href="https://blog.barracuda.com/2021/10/05/decryption-tool-controversy-erupts/">More than six million ransomware victims have used those tools to recover encrypted files.</a></p>
<p>However, a decryption tool can be developed only for the ransomware containing vulnerabilities. If a ransomware is 100% correctly coded, there is no vulnerability to exploit and no decryption key to be developed. Therefore, the decryption tool is a solution only for a certain type of ransomware. </p>
<p>Moreover, this option is safe only when proposed by a reliable editor. Many fake decryption tools used as scamming vectors are proposed for free online. Besides, the ransomware being in constant evolution, the decryption tools have to follow the updates to not be rapidly irrelevant.</p>
<p> </p>
<p><strong>The controversy of the decryption tools publication </strong></p>
<p>Decryption keys can be seen as ransomware vulnerabilities. In the same way that vulnerabilities are patched when discovered, when a decryption key is found, criminals patch their ransomware to make it more effective. The decryption key becomes irrelevant for the next victims. </p>
<p>Months before the Colonial Pipelines attacks, two searchers had found a decryption key to help DarkSide victims to recover and chose to not share it. But BitDefender discovered the key as well and published it online, alerting the victims, as well as the attackers. The day after this publication, DarkSide publicly informed they have corrected the problem and <a href="https://www.technologyreview.com/2021/05/24/1025195/colonial-pipeline-ransomware-bitdefender/">even address its “Special thanks to BitDefender for helping fix our issues. This will make us even better</a>”. </p>
<p>This is not an isolated case. Earlier this year, a Spanish searcher found and developed a decryption tool for the Avaddon ransomware. He published it online on GitHub with an explanation about how to use its tool. As in the case of DarkSide, <a href="https://www.lemondeinformatique.fr/actualites/lire-quand-la-publication-d-un-decrypteur-renforce-le-ransomware-avaddon-81965.html">this information was shared publicly, available for the victims as well as the ransomware developers, who corrected the vulnerabilities.</a> </p>
<p>In the KASEYA case, this decryption key was kept by the FIB because its publication would hinder an offensive cyber operation against the REvil gang. This implied letting victims such as schools and hospitals deal with the problem without sharing with them a solution, in order to reach the attackers. The operation didn&#8217;t happen immediately, as, in the same month, websites run by the REvil ransomware gang suddenly became inaccessible. </p>
<p>BreachQuest CTO Jake Williams called the situation a classic case of an intelligence gain/loss assessment. He pointed out that the direct financial damage was almost certainly larger than the FBI believed, but <a href="https://www.zdnet.com/article/fbi-decision-to-withhold-kaseya-ransomware-decryption-keys-stirs-debate/">“on the other hand, releasing the key solves an immediate need without addressing the larger issue of disrupting future ransomware operations</a>”. </p>
<p> </p>
<p><strong>Decryption tools: a partial solution</strong></p>
<p>Outside of the debate on the necessity to publish them, the crisis management interventions of the W-CERT pointed out that, even if helpful, the decryption tools are not the ultimate and perfect solution in a ransomware attack. </p>
<p>Indeed, decryption tools are only usable for a limited subset of existing ransomware, where encryption mechanisms were not created using state-of-the-art security. Even if the related ransomware attack falls under this case, which would mean the affected data will be able to get recovered safely, the attacked company still has to tackle the biggest issue of such an attack, meaning rebuilding at the very least the core of the information system that got compromised. Relying on decryption tools only to face the ransomware threat is far from being a complete and reliable solution.</p>
</td>
</tr>
</tbody>
</table>
<figure id="post-16217 media-16217" class="align-center">
<p style="text-align: center;"> </p>
</figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center">
<figure id="post-16369 media-16369" class="align-center"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-17508" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond.jpg" alt="" width="783" height="486" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-63x39.jpg 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-768x477.jpg 768w" sizes="(max-width: 783px) 100vw, 783px" /></figure>
<p><img decoding="async" class="aligncenter size-full wp-image-17510" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first.jpg" alt="" width="783" height="425" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-352x191.jpg 352w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-768x417.jpg 768w" sizes="(max-width: 783px) 100vw, 783px" /></p>
<p style="text-align: center;">For more information for vulnerability detection and remediation, contact Wavestone CERT-W!</p>
</figure>
</figure>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about the evolution of cybercrime, we recommend reading the <em>Internet Organized Crime Threat Assessment 2021</em> of Europol. This report focuses on changes and developments of cybercrime threats during the last 12 months.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img decoding="async" class="aligncenter wp-image-17512 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock.jpg" alt="" width="325" height="152" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock.jpg 325w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock-71x33.jpg 71w" sizes="(max-width: 325px) 100vw, 325px" /></figure>
<p style="text-align: center;"><a href="https://www.europol.europa.eu/cms/sites/default/files/documents/internet_organised_crime_threat_assessment_iocta_2021.pdf">Internet Organized Crime Threat Assessment 2021, Europol</a></p>
</figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/">CDT Watch &#8211; December 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch &#8211; November 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 08:50:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17399</guid>

					<description><![CDATA[<p>FOCUS TECH File Obfuscation Discover Cobalt Strike capabilities with the technical zoom of the month: To learn more about the given malwares: Cobalt Strike Training videos CERT-W: FROM THE FRONT LINE The First Responder Word We recommend the 2021 Benchmark...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/">CDT Watch &#8211; November 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">File Obfuscation</h2>
<p style="text-align: center;">Discover Cobalt Strike capabilities with the technical zoom of the month:</p>
<figure id="post-16383 media-16383" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17400" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1.png" alt="" width="771" height="456" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1.png 771w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-323x191.png 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-768x454.png 768w" sizes="auto, (max-width: 771px) 100vw, 771px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17402" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2.png" alt="" width="770" height="442" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2.png 770w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-333x191.png 333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-768x441.png 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17404" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3.png" alt="" width="772" height="442" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3.png 772w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-768x440.png 768w" sizes="auto, (max-width: 772px) 100vw, 772px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17406" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4.jpg" alt="" width="776" height="451" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4.jpg 776w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-329x191.jpg 329w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-768x446.jpg 768w" sizes="auto, (max-width: 776px) 100vw, 776px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17408" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5.jpg" alt="" width="777" height="458" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5.jpg 777w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-324x191.jpg 324w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-768x453.jpg 768w" sizes="auto, (max-width: 777px) 100vw, 777px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17410" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6.png" alt="" width="781" height="447" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6.png 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-768x440.png 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<figure id="post-16383 media-16383" class="align-center"></figure>
<p style="text-align: center;"><strong>To learn more about the given malwares:</strong></p>
<figure id="post-16217 media-16217" class="align-center">
<figure id="post-16385 media-16385" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-17412" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more.png" alt="" width="289" height="158" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more.png 223w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more-71x39.png 71w" sizes="auto, (max-width: 289px) 100vw, 289px" /></figure>
<p style="text-align: center;"><a href="https://www.cobaltstrike.com/training">Cobalt Strike Training videos</a></p>
</figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center">
<figure id="post-16369 media-16369" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17420" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10.jpg" alt="" width="781" height="523" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10.jpg 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-285x191.jpg 285w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-58x39.jpg 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-768x514.jpg 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<p style="text-align: center;">We recommend the <em>2021 Benchmark on cybersecurity incidents</em> which reviews the interventions of the CERT-W carried out between September 2020 and October 2021. This Benchmark provides keys to understanding the security issues and a snapshot of current cybersecurity threats in France.</p>
</figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17416" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8.png" alt="" width="222" height="122" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8.png 222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8-71x39.png 71w" sizes="auto, (max-width: 222px) 100vw, 222px" /></p>
<p style="text-align: center;"><u><a href="https://uk.wavestone.com/en/insight/cyberattacks-in-2021-ransomwares-still-threat-n1/">CERT-W’s 2021 Benchmark on cybersecurity incidents </a></u></p>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about Conti, one of the most dangerous Ransomware, we recommend reading the <em>Conti Ransomware Group In-Depth Analysis </em>of Prodaft. According to Prodaft, this report will show you how the gang works with details obtained by their team who accessed Conti’s infrastructure.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17418" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9.png" alt="" width="222" height="122" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9.png 222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9-71x39.png 71w" sizes="auto, (max-width: 222px) 100vw, 222px" /></figure>
<p style="text-align: center;"><a href="https://www.prodaft.com/m/reports/Conti_TLPWHITE_v1.6_WVcSEtc.pdf">Conti Ransomware Group In-Depth Analysis by Prodaft</a></p>
</figure>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/">CDT Watch &#8211; November 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Newsletter CERT-W, from the front line &#8211; June 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 24 Jun 2021 13:39:44 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[front line]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=16204</guid>

					<description><![CDATA[<p>DECRYPTION CYBER CRIMINAL NETWORK DISMANTELING The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them. What is&#160;Emotet?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-16207 media-16207" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16207" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png" alt="" width="1621" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png 1621w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-768x216.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-1536x431.png 1536w" sizes="auto, (max-width: 1621px) 100vw, 1621px" /></figure>
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">CYBER CRIMINAL NETWORK DISMANTELING</h2>
<p><strong>The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them.</strong></p>
<p><strong>What is&nbsp;Emotet?</strong></p>
<p>Emotet&nbsp;was originally a&nbsp;<strong>banking trojan,</strong> stealing emails and contact list, retrieving&nbsp;passwords on navigators and systems, spreading within the infected network.&nbsp;In&nbsp;2019,&nbsp;Emotet&nbsp;lost its banking module and became a&nbsp;<strong>dropper</strong> of malwares. The trojan used&nbsp;a&nbsp;<a href="https://www.justice.gov/opa/pr/emotet-botnet-disrupted-international-cyber-operation"><strong>botnet of 1.6 million machines</strong></a>&nbsp; to realize phishing campaign and install itself on victims’ machines.</p>
<p><strong>Why is&nbsp;Emotet called the “king of malware”?</strong></p>
<p>At the end of 2020,&nbsp;Emotet&nbsp;was identified as&nbsp;<a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action"><strong>one of the most dangerous&nbsp;malwares</strong></a>. Additionally, being a dropper as well as a botnet,&nbsp;Emotet&nbsp;also&nbsp;served&nbsp;as a&nbsp;<strong>front&nbsp;door</strong>&nbsp;to many other malwares.&nbsp;It&nbsp;was used to drop malicious payloads directly onto the victims’ assets: for example,&nbsp;TrickBot&nbsp;was dropped onto the targeted machine which in turn, would drop&nbsp;<strong>Ryuk&nbsp;or Conti ransomware</strong>. According to Checkpoint Research,&nbsp;Emotet&nbsp;was at the top of the Global Threat Index in October 2020 and was linked to a&nbsp;<a href="https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/"><strong>wave of ransomware attacks</strong></a>.&nbsp;According to CISA, the U.S. Cybersecurity &amp; Infrastructure Security Agency,&nbsp;Emotet&nbsp;infections cost is estimated at&nbsp;<a href="https://www.kaspersky.com/resource-center/threats/emotet"><strong>$1 million per incident</strong></a><strong>.</strong></p>
<p>&nbsp;</p>
<figure id="post-16210 media-16210" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16210" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png" alt="" width="877" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png 877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-233x191.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-48x39.png 48w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-768x631.png 768w" sizes="auto, (max-width: 877px) 100vw, 877px" /></figure>
<p style="text-align: center;"><em>Main TA542’s customer base, “The Malware As a Service EMOTET”, ANSSI 2021</em></p>
<p>&nbsp;</p>
<p>During several months, Europol used the help of Eurojust, France, Germany, United States of America and announced their successful dismantle of the Emotet network in January 2021.</p>
<p><strong>Does this dismantling&nbsp;mean&nbsp;the end of the&nbsp;malware?</strong></p>
<p>The end of one botnet actually <a href="https://info.phishlabs.com/blog/emotet-dismantled-trickbot-zloader-and-bazarloader-step-in"><strong>led to&nbsp;the rise of several others</strong></a>, such as&nbsp;TrickBot, which even though existed since 2016, replaced Emotet as one of the most well-established&nbsp;MaaS&nbsp;(Malware as a Service) not long after the events on January.</p>
<p>This turn of events might not be so surprising, as threat actors often pivot and change their tools along the way, whether by choice or by necessity as it was the case here. Taking one malware down would only force them to use another one. Yet, what is interesting is that&nbsp;<a href="https://blogs.microsoft.com/on-the-issues/2020/10/12/trickbot-ransomware-cyberthreat-us-elections/"><strong>TrickBot&nbsp;also suffered a dismantlement of its own</strong></a>, back in October 2020. In an attempt to disrupt one of the most used distributors of ransomware, Microsoft joined forces with other security teams to take down&nbsp;TrickBot&nbsp;servers. As you may have noticed, this was months before law-enforcement took down&nbsp;Emotet, and now&nbsp;<a href="https://securityintelligence.com/posts/trickbot-survival-instinct-trickboot-version/"><strong>TrickBot&nbsp;or other versions of this malware, still lives on</strong></a>. These actions only disrupted&nbsp;TrickBot&nbsp;activities for a few days, before going back to what&nbsp;it was and even&nbsp;<strong>overtaking&nbsp;Emotet&nbsp;dominance</strong>.</p>
<p>Moreover, TrickBot&nbsp;seems to be somehow connected to the&nbsp;<strong><a href="https://www.cybereason.com/threat-alert-new-trickbot-variants">Bazar</a></strong>&nbsp;malware (BazarLoader&nbsp;and&nbsp;BazarBackdoor), as some part of its infrastructure is shared with&nbsp;TrickBot&nbsp;and both show code similarities. This new toolset is now the most seen malware used to deploy&nbsp;Ryuk&nbsp;ransomware instead of the previous&nbsp;Emotet-TrickBot-Ryuk&nbsp;or&nbsp;TrickBot-Ryuk&nbsp;chain of infection. These changes might have to do with the previously mentioned&nbsp;dismantlements, or due to a new collaboration between threat actors.</p>
<p><strong>What about the people behind these groups?</strong></p>
<p>More recently, on June 4th,&nbsp;<a href="https://www.justice.gov/opa/pr/latvian-national-charged-alleged-role-transnational-cybercrime-organization"><strong>Alla&nbsp;Witte was charged on multiple counts</strong></a> for participating in&nbsp;TrickBot&nbsp;criminal activities. Is this arrest, serving as a warning with several hundreds of years of prison if convicted, going to change cybercriminals’ operations? A few months before that, the Ukrainian authorities cooperated with the French law enforcement to conduct&nbsp;<a href="https://blog.malwarebytes.com/ransomware/2021/02/egregor-ransomware-hit-by-arrests/"><strong>an arrest against Egregor members</strong></a>, while&nbsp;<a href="https://threatpost.com/netwalker-ransomware-suspect-charged/163405/"><strong>a Canadian tied to&nbsp;Netwalker&nbsp;ransomware was charged</strong>&nbsp;</a>by the police for distributing the malware. Last year was also marked by several other arrests of cybercriminals around the world. For instance,&nbsp;<a href="https://www.zdnet.com/article/europol-arrests-hackers-behind-infinity-black-hacker-group/"><strong>the arrest of members of the Infinity Black website&nbsp;</strong></a>selling user credentials, lead to the end of the website and the group altogether. On the other hand, the arrests mentioned regarding&nbsp;Netwalker&nbsp;and Egregor seem to concern ransomware affiliates. And as the operators are still free and collaborate with other affiliates, their ransomware continues being deployed around the world.&nbsp;Alla&nbsp;Witte’s case is different since she is suspected to be a malware developer for the&nbsp;TrickBot&nbsp;Group. While her possible conviction might slightly disrupt&nbsp;TrickBot, it seems like their operations still go on, as according to <a href="https://any.run/malware-trends/trickbot">the&nbsp;any.run&nbsp;website and its malware trend tracker, the trojan was last seen on June 16th, 2021</a>. Last but not least, <a href="https://www.bleepingcomputer.com/news/security/ukraine-arrests-clop-ransomware-gang-members-seizes-servers/">some mid-tier members of the Cl0p gang may have been arrested</a> mid-June in Ukraine even though it seems no core actor behind Cl0p were apprehended.</p>
<p><strong>What could be the long-term consequences of these takedown for the cybercriminal activities?</strong></p>
<p>It’s still early to draw meaningful conclusions on the consequences for cybercriminal activities with the recent arrests. Yesterday, June 16th, at the Geneva summit, U.S. <a href="https://www.zdnet.com/article/biden-and-putin-spar-over-cybersecurity-ransomware-at-geneva-summit/"><strong>President Joe Biden met with Russian President Vladimir Putin</strong></a>. One of the hot topics of discussions was the <strong>ransomware attacks on U.S. entities from Russian soil</strong>. Biden warned Putin that United States would not tolerate any other cyber-attacks, especially on 16 critical sectors. The <a href="https://www.zdnet.com/article/ransomware-russia-told-to-tackle-cyber-criminals-operating-from-within-its-borders/"><strong>G7</strong></a> and the <a href="https://www.zdnet.com/article/nato-series-of-cyberattacks-could-be-seen-as-the-same-threat-as-an-armed-attack/"><strong>NATO</strong></a> also stated that in order not to consider cyber-attacks as armed attacks, Russia should try to identify and disrupt ransomware organizations within its borders.</p>
<p>Even with the arrests of criminal gang members and cybersecurity talks at the presidential levels, <strong>some experts say there would be no or little impact on ransomware groups that will still operate with impunity</strong>. The near future will give hints about the possible evolution of the cyber-attacks landscape. On one hand, the rising of a broader international collaboration against cyber-criminal gangs which could lead to less opportunistic and lucrative attacks. On the other hand, growing tensions between two blocks: U.S.-Europe and Russia-China with possible sanctions from either side and more cyber espionage, supply-chain or state-sponsored attacks.</p>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16228" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg" alt="" width="936" height="638" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg 936w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-768x523.jpg 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>
</figure>
<h1></h1>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Phishing</h2>
<p>Think like a cybercriminal and understand how a spear phishing campaign is built to avoid them!</p>
<p>The technical zoom of the month:</p>
<figure id="post-16215 media-16215" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16215" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png" alt="" width="973" height="1849" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png 973w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-101x191.png 101w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-21x39.png 21w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-768x1459.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-808x1536.png 808w" sizes="auto, (max-width: 973px) 100vw, 973px" /></figure>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>To learn more about this:</strong></p>
<figure id="post-16217 media-16217" class="align-center"><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish-infographic"><img loading="lazy" decoding="async" class="aligncenter wp-image-16217" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png" alt="" width="235" height="197" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png 462w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-46x39.png 46w" sizes="auto, (max-width: 235px) 100vw, 235px" /></a></figure>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the short report “APT trends report Q1 2021”, which reviews the highlight events and findings observed by the Global Research and Analysis Team at Kaspersky during the Q1 2021 around the world.</p>
<figure id="post-16219 media-16219" class="align-center"><a href="https://securelist.com/apt-trends-report-q1-2021/101967/"><img loading="lazy" decoding="async" class="aligncenter wp-image-16219" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg" alt="" width="248" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg 415w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-63x39.jpg 63w" sizes="auto, (max-width: 248px) 100vw, 248px" /></a></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
