<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>emotet - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/emotet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/emotet/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 13 Jan 2023 10:58:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>emotet - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/emotet/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CDT Watch – December 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 10:48:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[BYOVKD]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Redis]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19444</guid>

					<description><![CDATA[<p>FOCUS TECH BRING YOUR OWN VULNERABLE KERNEL DRIVER (BYOVKD) Facing the EDR behavioral supervision, attacker develops techniques for successful attacks by staying under the radars. One of these techniques is called BYOVKD: Bring Your Own Vulnerable Kernel Driver. Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/">CDT Watch – December 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;">FOCUS TECH</h2>
<h3 style="text-align: center;">BRING YOUR OWN VULNERABLE KERNEL DRIVER (BYOVKD)</h3>
<p style="text-align: justify;">Facing the EDR behavioral supervision, attacker develops techniques for successful attacks by staying under the radars. One of these techniques is called BYOVKD: Bring Your Own Vulnerable Kernel Driver.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-19447" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1.png" alt="" width="1625" height="1091" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1.png 1625w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-768x516.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-1536x1031.png 1536w" sizes="(max-width: 1625px) 100vw, 1625px" /></p>
<p style="text-align: justify;">Even if it does not raise an alert on the EDR console, the Defense team must <strong>be vigilant</strong> to any telemetry that would indicate the <strong>loading of an unusual driver on assets</strong>. Furthermore, <strong>prevention mechanisms</strong> exist for this type of case, some examples below:</p>
<ul>
<li style="text-align: justify;"><a href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#block-abuse-of-exploited-vulnerable-signed-drivers">Block abuse of exploited vulnerable signed drivers</a></li>
<li style="text-align: justify;"><a style="font-size: revert;" href="https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules">Driver block rules</a></li>
</ul>
<h2> </h2>
<h2 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h2>
<h3 style="text-align: center;">THE FIRST RESPONDER WORD</h3>
<p><img decoding="async" class="aligncenter size-full wp-image-19449" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2.png" alt="" width="770" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2.png 770w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-355x191.png 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-768x413.png 768w" sizes="(max-width: 770px) 100vw, 770px" /></p>
<p> </p>
<p> </p>
<h2 style="text-align: center;"><strong>READING OF THE MONTH</strong></h2>
<h3 style="text-align: center;">EMOTET</h3>
<p><strong>What is Emotet 2022?</strong></p>
<p style="text-align: justify;"><strong>Emotet is a <em>Malware-as-a-Service</em></strong> (<em>MaaS</em>) relying on a botnet network which appeared in 2014. It was originally designed as a banking Trojan aiming to steal sensitive information related to bank accounts<em>.</em> In 2021, police forces arrested several people belonging to Emotet organization, which then <strong>reappeared with new features in 2022</strong>. The group behind Emotet seems to be <strong>opportunist</strong> and most of its victims are from US, UK, Japan, Germany, Italy, Spain, <strong>France</strong>, and Brazil.</p>
<p><strong>Why is it dangerous?</strong></p>
<p style="text-align: justify;">Emotet is a polymorphic malware whose code changes over time. Among the numerous new features of the 2022 version, searchers from the <a href="https://thedfirreport.com/2022/09/12/dead-or-alive-an-emotet-story/">DFIR Report</a> have identified an ability to <strong>bypass anti-malware detection</strong>. To do that, Emotet 2022 uses a 64 bits base code and various signatures to avoid pattern recognition. The malware is also able <strong>to keep itself up to date</strong> once downloaded by using <strong>Command &amp; Control servers</strong>, which send it updates the same as an Operating System. The <em>MaaS</em> is also <strong>able to release IcedID</strong>, which are modular banking Trojans able <strong>to drop other malwares</strong>. Doing so, Emotet helped to distribute ransomwares for impact, Cobalt Strike for initial access, XMRig for stealing wallet data…</p>
<p><strong>How does Emotet 2022 initial infection work?</strong></p>
<p style="text-align: justify;">Using a <strong>phishing email with a malicious Office attachment</strong>, Emotet exploits a 2017 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-11882">Microsoft vulnerability</a> which allows remote code execution on vulnerable devices (CVE 2017-11882) to compromise its first victim.</p>
<p style="text-align: justify;">Once downloaded in memory, the malware executes a sequence of legitimate Windows commands to <strong>perform a recognition of its environment,</strong> then spreads in the local network and steals information.</p>
<p style="text-align: justify;">Emotet spreads through spam emails. According to <a href="https://www.deepinstinct.com/blog/emotet-malware-returns-in-2022"><em>Deep Instinct</em></a>, 45% of them are containing malicious Office attachment such as Spreadsheets or scripts in most of the cases. As those emails traduce the object and attachments names in the target’s local language and come from known senders, the phishing looks particularly realistic.<img decoding="async" class="aligncenter size-full wp-image-19451" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3.png" alt="" width="1111" height="528" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3.png 1111w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-402x191.png 402w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-768x365.png 768w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<p style="text-align: center;"><a href="https://www.proofpoint.com/us/blog/threat-insight/comprehensive-look-emotets-fall-2022-return">Comprehensive look of EMOTET fall 2022</a></p>
<p style="text-align: left;"><strong>Why is this new version of the MaaS particularly tricky?</strong></p>
<p style="text-align: justify;">Emotet 2022 can identify whether it’s downloaded into a sandbox environment, or a device connected to a network. In the first configuration it won’t activate itself, but in the second it will rely <strong>on a password dictionary to spread</strong> thanks to brute-force.  Moreover, the November 2022 Excel files generally enclosed <strong>contains macros which no longer needs a user click to be authorized</strong>. The victim is only asked two things: <strong>copying the files into the Microsoft Office Template zone, which requires administrator privileges</strong>. Opening the file in this location will execute the macros without any warnings.</p>
<p style="text-align: justify;"><strong>How to protect from Emotet 2022?</strong></p>
<p>Since Emotet 2022 uses malicious spam and phishing is the most used technique for initial access, we highly advice you to consider these measures:</p>
<ul>
<li style="text-align: justify;">Provide your company a <strong>solution against phishing</strong>.</li>
<li style="text-align: justify;">Launch an <strong>awareness campaign</strong> for employees and stakeholders.</li>
<li style="text-align: justify;">Provide you company an <strong>Endpoint Detection and Response</strong> which complete the anti-virus by performing <strong>behavioural analysis</strong>, which helps visualize the virus kill chain to identify the action levers.</li>
</ul>
<p style="text-align: justify;">Give a local administrator account to an employee only in case of specific need.</p>
<p> </p>
<h2 style="text-align: center;">VULNERABILITY OF THE MONTH</h2>
<h3 style="text-align: center;">DEBIAN-SPECIFIC REDIS SERVER LUA SANDBOX ESCAPE VULNERABILITY &#8211; <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0543"><strong>CVE-2022-0543</strong></a></h3>
<p style="text-align: center;">Published by NVD: 18/02/2022</p>
<p style="text-align: center;"><strong>Products: </strong>Redis server for Debian and Debian-derived Linux distributions</p>
<p style="text-align: center;"><strong>Versions: </strong>less and equal to 5:5.0.14-1+deb10u2, 5:6.0.16-1+deb11u2, 5:7.0.5-1, 5:7.0.7-1</p>
<p style="text-align: center;"><strong>Score: </strong><strong>10 CRITICAL</strong></p>
<p style="text-align: center;"><a href="https://blog.aquasec.com/redigo-redis-backdoor-malware"><strong>Context</strong></a><strong>  </strong><a href="https://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html"><strong>PoC</strong></a></p>
<p style="text-align: justify;"><a href="https://redis.io/">Redis</a> is an opensource NoSQL database management system. Redis includes an <strong>embedded Lua scripting engine</strong>, it allows client to run scripts. By design, the Lua engine must be <strong>sandboxed</strong>: it means that packages and APIs available are limited in an execution context. Redis clients <strong>are not allowed to execute arbitrary code</strong> on the Redis server.</p>
<p style="text-align: justify;">In some <strong>Debian and Debian-derived Linux packages</strong>, the Lua environment is <strong>not sufficiently regulated </strong>because the Lua Library is provided as a dynamic library. It can allow attackers to access arbitrary Lua functionalities and results in a Lua Sandbox escape.</p>
<p style="text-align: justify;">Early December, reports indicate that attackers are exploiting this vulnerability <strong>to deploy a new backdoor malware dubbed Redigo</strong> on Redis Server. The malware communicates with a server of command and control using <strong>port 6379 </strong>which is a legitimate port used by Redis for communication between client and server: the Redis server joins a botnet network.</p>
<p style="text-align: justify;">According to <a href="https://blog.aquasec.com/redigo-redis-backdoor-malware"><em>Aqua</em></a>, the malware has some functions specially written to the Redis server which may imply that the group behind this desired <strong>to build an adjusted attack that would target Redis servers</strong>.</p>
<p style="text-align: justify;"><strong>A successful attack implies that attacker could execute arbitrary commands and access to sensitive information.</strong></p>
<p style="text-align: justify;">A group of attackers is behind the Redigo malware which is an emerging threat. Furthermore, the <strong>exploit of the CVE-2022-0543 is public</strong> and is <strong>used in the wild</strong> to deploy the malware. <strong>Vulnerable Redis Server must be patched and up to date</strong>.</p>
<p> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/">CDT Watch – December 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Newsletter CERT-W, from the front line &#8211; June 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 24 Jun 2021 13:39:44 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[front line]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=16204</guid>

					<description><![CDATA[<p>DECRYPTION CYBER CRIMINAL NETWORK DISMANTELING The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them. What is&#160;Emotet?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-16207 media-16207" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16207" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png" alt="" width="1621" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png 1621w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-768x216.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-1536x431.png 1536w" sizes="auto, (max-width: 1621px) 100vw, 1621px" /></figure>
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">CYBER CRIMINAL NETWORK DISMANTELING</h2>
<p><strong>The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them.</strong></p>
<p><strong>What is&nbsp;Emotet?</strong></p>
<p>Emotet&nbsp;was originally a&nbsp;<strong>banking trojan,</strong> stealing emails and contact list, retrieving&nbsp;passwords on navigators and systems, spreading within the infected network.&nbsp;In&nbsp;2019,&nbsp;Emotet&nbsp;lost its banking module and became a&nbsp;<strong>dropper</strong> of malwares. The trojan used&nbsp;a&nbsp;<a href="https://www.justice.gov/opa/pr/emotet-botnet-disrupted-international-cyber-operation"><strong>botnet of 1.6 million machines</strong></a>&nbsp; to realize phishing campaign and install itself on victims’ machines.</p>
<p><strong>Why is&nbsp;Emotet called the “king of malware”?</strong></p>
<p>At the end of 2020,&nbsp;Emotet&nbsp;was identified as&nbsp;<a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action"><strong>one of the most dangerous&nbsp;malwares</strong></a>. Additionally, being a dropper as well as a botnet,&nbsp;Emotet&nbsp;also&nbsp;served&nbsp;as a&nbsp;<strong>front&nbsp;door</strong>&nbsp;to many other malwares.&nbsp;It&nbsp;was used to drop malicious payloads directly onto the victims’ assets: for example,&nbsp;TrickBot&nbsp;was dropped onto the targeted machine which in turn, would drop&nbsp;<strong>Ryuk&nbsp;or Conti ransomware</strong>. According to Checkpoint Research,&nbsp;Emotet&nbsp;was at the top of the Global Threat Index in October 2020 and was linked to a&nbsp;<a href="https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/"><strong>wave of ransomware attacks</strong></a>.&nbsp;According to CISA, the U.S. Cybersecurity &amp; Infrastructure Security Agency,&nbsp;Emotet&nbsp;infections cost is estimated at&nbsp;<a href="https://www.kaspersky.com/resource-center/threats/emotet"><strong>$1 million per incident</strong></a><strong>.</strong></p>
<p>&nbsp;</p>
<figure id="post-16210 media-16210" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16210" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png" alt="" width="877" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png 877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-233x191.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-48x39.png 48w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-768x631.png 768w" sizes="auto, (max-width: 877px) 100vw, 877px" /></figure>
<p style="text-align: center;"><em>Main TA542’s customer base, “The Malware As a Service EMOTET”, ANSSI 2021</em></p>
<p>&nbsp;</p>
<p>During several months, Europol used the help of Eurojust, France, Germany, United States of America and announced their successful dismantle of the Emotet network in January 2021.</p>
<p><strong>Does this dismantling&nbsp;mean&nbsp;the end of the&nbsp;malware?</strong></p>
<p>The end of one botnet actually <a href="https://info.phishlabs.com/blog/emotet-dismantled-trickbot-zloader-and-bazarloader-step-in"><strong>led to&nbsp;the rise of several others</strong></a>, such as&nbsp;TrickBot, which even though existed since 2016, replaced Emotet as one of the most well-established&nbsp;MaaS&nbsp;(Malware as a Service) not long after the events on January.</p>
<p>This turn of events might not be so surprising, as threat actors often pivot and change their tools along the way, whether by choice or by necessity as it was the case here. Taking one malware down would only force them to use another one. Yet, what is interesting is that&nbsp;<a href="https://blogs.microsoft.com/on-the-issues/2020/10/12/trickbot-ransomware-cyberthreat-us-elections/"><strong>TrickBot&nbsp;also suffered a dismantlement of its own</strong></a>, back in October 2020. In an attempt to disrupt one of the most used distributors of ransomware, Microsoft joined forces with other security teams to take down&nbsp;TrickBot&nbsp;servers. As you may have noticed, this was months before law-enforcement took down&nbsp;Emotet, and now&nbsp;<a href="https://securityintelligence.com/posts/trickbot-survival-instinct-trickboot-version/"><strong>TrickBot&nbsp;or other versions of this malware, still lives on</strong></a>. These actions only disrupted&nbsp;TrickBot&nbsp;activities for a few days, before going back to what&nbsp;it was and even&nbsp;<strong>overtaking&nbsp;Emotet&nbsp;dominance</strong>.</p>
<p>Moreover, TrickBot&nbsp;seems to be somehow connected to the&nbsp;<strong><a href="https://www.cybereason.com/threat-alert-new-trickbot-variants">Bazar</a></strong>&nbsp;malware (BazarLoader&nbsp;and&nbsp;BazarBackdoor), as some part of its infrastructure is shared with&nbsp;TrickBot&nbsp;and both show code similarities. This new toolset is now the most seen malware used to deploy&nbsp;Ryuk&nbsp;ransomware instead of the previous&nbsp;Emotet-TrickBot-Ryuk&nbsp;or&nbsp;TrickBot-Ryuk&nbsp;chain of infection. These changes might have to do with the previously mentioned&nbsp;dismantlements, or due to a new collaboration between threat actors.</p>
<p><strong>What about the people behind these groups?</strong></p>
<p>More recently, on June 4th,&nbsp;<a href="https://www.justice.gov/opa/pr/latvian-national-charged-alleged-role-transnational-cybercrime-organization"><strong>Alla&nbsp;Witte was charged on multiple counts</strong></a> for participating in&nbsp;TrickBot&nbsp;criminal activities. Is this arrest, serving as a warning with several hundreds of years of prison if convicted, going to change cybercriminals’ operations? A few months before that, the Ukrainian authorities cooperated with the French law enforcement to conduct&nbsp;<a href="https://blog.malwarebytes.com/ransomware/2021/02/egregor-ransomware-hit-by-arrests/"><strong>an arrest against Egregor members</strong></a>, while&nbsp;<a href="https://threatpost.com/netwalker-ransomware-suspect-charged/163405/"><strong>a Canadian tied to&nbsp;Netwalker&nbsp;ransomware was charged</strong>&nbsp;</a>by the police for distributing the malware. Last year was also marked by several other arrests of cybercriminals around the world. For instance,&nbsp;<a href="https://www.zdnet.com/article/europol-arrests-hackers-behind-infinity-black-hacker-group/"><strong>the arrest of members of the Infinity Black website&nbsp;</strong></a>selling user credentials, lead to the end of the website and the group altogether. On the other hand, the arrests mentioned regarding&nbsp;Netwalker&nbsp;and Egregor seem to concern ransomware affiliates. And as the operators are still free and collaborate with other affiliates, their ransomware continues being deployed around the world.&nbsp;Alla&nbsp;Witte’s case is different since she is suspected to be a malware developer for the&nbsp;TrickBot&nbsp;Group. While her possible conviction might slightly disrupt&nbsp;TrickBot, it seems like their operations still go on, as according to <a href="https://any.run/malware-trends/trickbot">the&nbsp;any.run&nbsp;website and its malware trend tracker, the trojan was last seen on June 16th, 2021</a>. Last but not least, <a href="https://www.bleepingcomputer.com/news/security/ukraine-arrests-clop-ransomware-gang-members-seizes-servers/">some mid-tier members of the Cl0p gang may have been arrested</a> mid-June in Ukraine even though it seems no core actor behind Cl0p were apprehended.</p>
<p><strong>What could be the long-term consequences of these takedown for the cybercriminal activities?</strong></p>
<p>It’s still early to draw meaningful conclusions on the consequences for cybercriminal activities with the recent arrests. Yesterday, June 16th, at the Geneva summit, U.S. <a href="https://www.zdnet.com/article/biden-and-putin-spar-over-cybersecurity-ransomware-at-geneva-summit/"><strong>President Joe Biden met with Russian President Vladimir Putin</strong></a>. One of the hot topics of discussions was the <strong>ransomware attacks on U.S. entities from Russian soil</strong>. Biden warned Putin that United States would not tolerate any other cyber-attacks, especially on 16 critical sectors. The <a href="https://www.zdnet.com/article/ransomware-russia-told-to-tackle-cyber-criminals-operating-from-within-its-borders/"><strong>G7</strong></a> and the <a href="https://www.zdnet.com/article/nato-series-of-cyberattacks-could-be-seen-as-the-same-threat-as-an-armed-attack/"><strong>NATO</strong></a> also stated that in order not to consider cyber-attacks as armed attacks, Russia should try to identify and disrupt ransomware organizations within its borders.</p>
<p>Even with the arrests of criminal gang members and cybersecurity talks at the presidential levels, <strong>some experts say there would be no or little impact on ransomware groups that will still operate with impunity</strong>. The near future will give hints about the possible evolution of the cyber-attacks landscape. On one hand, the rising of a broader international collaboration against cyber-criminal gangs which could lead to less opportunistic and lucrative attacks. On the other hand, growing tensions between two blocks: U.S.-Europe and Russia-China with possible sanctions from either side and more cyber espionage, supply-chain or state-sponsored attacks.</p>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16228" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg" alt="" width="936" height="638" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg 936w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-768x523.jpg 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>
</figure>
<h1></h1>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Phishing</h2>
<p>Think like a cybercriminal and understand how a spear phishing campaign is built to avoid them!</p>
<p>The technical zoom of the month:</p>
<figure id="post-16215 media-16215" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16215" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png" alt="" width="973" height="1849" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png 973w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-101x191.png 101w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-21x39.png 21w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-768x1459.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-808x1536.png 808w" sizes="auto, (max-width: 973px) 100vw, 973px" /></figure>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>To learn more about this:</strong></p>
<figure id="post-16217 media-16217" class="align-center"><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish-infographic"><img loading="lazy" decoding="async" class="aligncenter wp-image-16217" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png" alt="" width="235" height="197" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png 462w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-46x39.png 46w" sizes="auto, (max-width: 235px) 100vw, 235px" /></a></figure>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the short report “APT trends report Q1 2021”, which reviews the highlight events and findings observed by the Global Research and Analysis Team at Kaspersky during the Q1 2021 around the world.</p>
<figure id="post-16219 media-16219" class="align-center"><a href="https://securelist.com/apt-trends-report-q1-2021/101967/"><img loading="lazy" decoding="async" class="aligncenter wp-image-16219" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg" alt="" width="248" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg 415w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-63x39.jpg 63w" sizes="auto, (max-width: 248px) 100vw, 248px" /></a></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
