Since the beginning of 2013, the popular press has documented many major information security intrusions and attacks. These stories have included veiled hints that the amount of sophistication suggests the intrusions are perpetrated by “advanced persistent” adversaries who must be sponsored by nation-states. Dell SecureWorks Counter Threat Unit™ (CTU) researchers have drawn a different conclusion based on evidence left behind from recent persistent intrusions in well-secured organizations.
Since the evening of July 21, 2014, Dell SecureWorks Counter Threat Unit™ (CTU) researchers have observed a threat group the CTU research team refers to as Threat Group-0110 (TG-0110)[i] phishing many organizations in the manufacturing and financial verticals. TG-0110 is known for using the Pirpi backdoor to access endpoints. Pirpi can search for and exfiltrate files, run other executable files, and execute commands. It also has reverse shell capabilities.
Dell SecureWorks CTU(TM) researchers have observed the distribution of a modified version of the Gameover Zeus malware. The global Gameover Zeus infrastructure was disrupted in late May 2014 by law enforcement and private industry partners during Operation Tovar. The infrastructure, including its peer-to-peer (P2P) network, remains under the control of those organizations and is not available to the threat actors who originally operated it. The new version observed in distribution on July 10, 2014 has jettisoned the P2P component in favor of a centralized command and control (C2) infrastructure that is based on a domain generation algorithm (DGA).
Dell SecureWorks will be attending the 2014 Gartner Security and Risk Management Summit as a Premier Sponsor June 23-26 in National Harbor, Maryland. If you are attending the conference, be sure to check out some of the exciting activities we have planned for the week around endpoint security, incident response planning, social engineering and much more.
As early as February 8th of this year, computer users began to notice their Synology Network Attached Storage (NAS) boxes were performing sluggishly and had a very high CPU usage. As a result, investigations ensued and eventually a Facebook post, directed at Synology, was made. Ultimately, it was discovered that the cause of the excessive resource consumption was due to illegitimate software that had infected the systems, which ironically, was stored in a folder labeled “PWNED.”
We are thrilled to announce former Navy SEAL Team Leader Robert O’Neill as our special guest at this year’s Gartner Security and Risk Management Summit in National Harbor, Maryland. If you are attending our discussions and activities around endpoint security, cyber security or our other information security services, be sure to swing by our hospitality […]
Dell SecureWorks partnered with international law enforcement and industry to take proactive action against the infrastructure of the Gameover Zeus botnet and the CryptoLocker ransomware, as well as the operators responsible for these threats. This action has been named Operation Tovar. Law enforcement organizations including the Federal Bureau of Investigation (FBI), the UK’s National Crime Agency, and Europol’s European Cybercrime Center (EC3) seized infrastructure assets relating to these threats, while technical measures were enacted to neutralize the command and control (C2) infrastructure.
If you plan to attend the Gartner Security and Risk Management Summit on June 23-26 in National Harbor, Maryland, you definitely need to check out some of the events we are hosting while you are there.
Dell SecureWorks Counter Threat Unit™ (CTU) researchers discovered the Cueisfry first-stage downloader trojan while analyzing a spearphishing message sent to an email account belonging to an intelligence-related group in Japan. The message was part of an Advanced Persistent Threat (APT) campaign targeting government officials and economic institutions in Southeast Asia.
Dell SecureWorks Counter Threat Unit™ (CTU) researchers interact directly with clients during targeted threat incident response engagements. These engagements provide access to a wide range of data for both analysis and research. CTU researchers can deploy host-based endpoint analysis agents and network monitoring systems, and can collect infrastructure logs for analysis. This access, coupled with alerts from Dell SecureWorks iSensors, allows CTU researchers to achieve a much deeper, targeted level of analysis. As a result, CTU researchers have observed a wide range of tactics, techniques, and procedures (TTPs) used by threat actors to deploy a popular remote access trojan (RAT). Some of these tactics, including the following examples, run counter to assumptions about common techniques.