

Rewterz Threat Advisory – CVE-2020-25163 – ICS: OSIsoft PI Vision
November 12, 2020
Rewterz Threat Advisory – New Variant of CRAT Remote Access Trojan
November 13, 2020
Rewterz Threat Advisory – CVE-2020-25163 – ICS: OSIsoft PI Vision
November 12, 2020
Rewterz Threat Advisory – New Variant of CRAT Remote Access Trojan
November 13, 2020Severity
High
Analysis Summary
A new hacker-for-hire mercenary group is detected with ties to attacks targeting victims all over the world. The group named CostaRicto, is the fifth hacker-for-hire group discovered this year. Details about CostaRicto’s current origins and whereabouts still remain unknown. The group has orchestrated attacks all over the globe across different countries in Europe, the Americas, Asia, Australia, and Africa. However, the biggest concentration of victims appears to be in South Asia, and especially India, Bangladesh, and Singapore, suggesting that the threat actor could be based in the region. The victims’ profiles are diverse across several verticals, with a large portion being financial institutions. The group is using custom-built and never-before-seen malware, however they are not operating using any innovative techniques. Most of their attacks rely on stolen credentials or spear-phishing emails as the initial entry vector. These emails usually deliver a backdoor trojan named Sombra or SombRAT. The backdoor trojan allows CostaRicto operators to access infected hosts, search for sensitive files, and exfiltrate important documents. This data is usually sent back to CostaRicto command-and-control infrastructure, which is usually hosted on the dark web, and accessible only via Tor. Furthermore, the infected hosts usually connect these servers via a layer of proxies and SSH tunnels to hide the malicious traffic from the infected organizations.
Impact
- Credential Theft
- Data Exfiltration
- Theft of Sensitive Information
- Unauthorized Remote Access
Indicators of Compromise
Domain Name
- infosportals[.]com
- mail[.]kub-gas[.]com
- akams[.]in
- newspointview[.]com
MD5
- 5b6af6264ba1289d0793e2be480ba80c
- 2eb116f76fcaedaac0e37c179ebd7c2b
- 3fdbd3bd4862eb294e2aaf96e8a1c14f
- d5a4616103aa0b458558c83f4faea5d4
- 05e133f34e44d75e596811bffba24156
- 084766595dcc2c0f06232fa0f447cb1a
- a6a34370a0ae552a4266b920738d3b14
- e10ba7d92ec75be0e74705e602a4070d
- eebb8497f6e92db77debe5bf6ebce48d
- 8b54da23ed16dca00d3188f419d697ea
- f43377b04b66d1aed783cd6037e3298d
- 69b064a335d76c261b1a26781ad77386
- 1829b57d3663eb987e26ed7065aa660b
SHA-256
- d69764b22d1b68aa9462f1f5f0bf18caebbcff4d592083f80dbce39c64890295
- fa74f70baa15561c28c793b189102149d3fb4f24147adc5efbd8656221c0960b
- ee0f4afee2940bbe895c1f1f60b8967291a2662ac9dca9f07d9edf400d34b58a
- 561bf3f3db67996ce81d98f1df91bfa28fb5fc8472ed64606ef8427a97fd8cdd
- f6ecdae3ae4769aaafc8a0faab30cb66dab8c9d3fff27764ff208be7a455125c
- c0db3dadf2e270240bb5cad8a652e5e11e3afe41b8ee106d67d47b06f5163261
- 8062e1582525534b9c52c5d9a38d6b012746484a2714a14febe2d07af02c32d5
- 6df8271ae0380737734b2dd6d46d0db3a30ba35d7379710a9fb05d1510495b49
- 7424d6daab8407e85285709dd27b8cce7c633d3d4a39050883ad9d82b85198bf
- 130fa726df5a58e9334cc28dc62e3ebaa0b7c0d637fce1a66daff66ee05a9437
- 79009ee869cec789a3d2735e0a81a546b33e320ee6ae950ba236a9f417ebf763
- 8323094c43fcd2da44f60b46f043f7ca4ad6a2106b6561598e94008ece46168b
- d8189ebdec637fc83276654635343fb422672fc5e3e2818df211fb7c878a3155
SHA1
- 5577a62645a5ed6559925fa46cbfa99cb301f4ca
- 7526bd5f857beb3ad44875c99c399c1400923a33
- 31947532ccc6bbd9e6d14b71f8a4fe37eed32651
- 3569146a3eb964b49e9bff6d1700c7b046148f15
- 0551083d22430deedc3c5bdca509a871f0128732
- a20eb3e605a9c04fca23c4cabfbe13248c9887e3
- a5bb2437e9f30a9271f90e7d1fe381a521e8b007
- b6e9fd7c82bd92913308e0a1c777aad3a1387c64
- d585f7d7736d8efd4b7b8d298ecb503bf60bbe3a
- 54bf0c8d459bfc8aad0eddcbffbcb51cc18000a1
- 57b068b2f9d44e432f7acd04f334b1390290e9c3
- d07e695e718206f0e679709deac71f87885db40f
- 4c25cd61bd6673bd3a75373e3ff9cd7567f2439f
Source IP
- 212[.]114[.]52[.]98
- 45[.]89[.]175[.]206
- 45[.]138[.]172[.]54
- 144[.]217[.]53[.]146
- 212[.]83[.]61[.]227
- 159[.]65[.]31[.]84
Remediation
- Block the threat indicators at their respective controls.
- Do not download files attached in untrusted emails.
- Enable multi-factor authentication and enable a strong password policy.