Rewterz
Rewterz Threat Advisory – CVE-2019-18189 – Trend Micro Commercial Endpoints Root Login Bypass with Directory Traversal Vulnerability
October 29, 2019
Rewterz
Rewterz Threat Advisory – CVE-2019-16675 – ICS: PHOENIX CONTACT Automation Worx Software Suite
October 30, 2019

Rewterz Threat Alert – Recent Lazarus activity – IOC’s

Severity

High

Analysis Summary

Potential DTRACK dumps the data mined output via manually mapped share over SMB to RFC1918 address with a statically encoded user/pass, containing the hard-coded username and password likely stolen from an Indian nuclear plant operator.

Lazarus has been active in the South Asian region targeting different facilities in India, Pakistan and Bangladesh. This time they’ve hit the nuclear facility in India, a second 1,000 MW nuclear power unit at Kudankulam, owned by the Nuclear Power Corporation of India Ltd. The atomic power plant stopped generation about 12.30 a.m. on Saturday owing to “Steam Generation level low”, the company added.

Impact

Exposure of sensitive information

Indicators of Compromise

SHA256

  • c5c1ca4382f397481174914b1931e851a9c61f029e6b3eb8a65c9e92ddf7aa4c
  • a0664ac662802905329ec6ab3b3ae843f191e6555b707f305f8f5a0599ca3f68
  • 93a01fbbdd63943c151679d037d32b1d82a55d66c6cb93c40ff63f2b770e5ca9
  • 791c59a0d6456ac1d9976fe82dc6b13f3e5980c6cfa2fd9d58a3cc849755ea9f
  • 4b1948bc4fe200d493a106474f460a744fce2be0c5e33f97fc09aaafb84f6f9a
  • 3cc9d9a12f3b884582e5c4daf7d83c4a510172a836de90b87439388e3cde3682
  • bfb39f486372a509f307cde3361795a2f9f759cbeb4cac07562dcbaebc070364

Remediation

Block all threat indicators at your respective controls.