

Threat Actor Claims to Have Breached Dubai Government Systems with Ransomware
June 6, 2024
CVE-2024-21682 – Atlassian Assets Vulnerability
June 7, 2024
Threat Actor Claims to Have Breached Dubai Government Systems with Ransomware
June 6, 2024
CVE-2024-21682 – Atlassian Assets Vulnerability
June 7, 2024Severity
Medium
Analysis Summary
SolarMarker, known as Jupyter or Yellow Cockatoo, is a sophisticated infostealer malware that emerged in early 2021. It spreads through phishing emails containing malicious attachments or links, and once installed on a system, it collects sensitive information and transmits it to attackers. SolarMarker's primary objective is to steal login credentials, personal data, and financial information from its victims.
The malware employs various techniques to achieve its goals, including keylogging, form grabbing, and screen capturing. By capturing keystrokes and monitoring web browsing activities, SolarMarker gains access to sensitive data users enter. It also utilizes obfuscation and anti-analysis techniques to evade detection by security tools.
One notable feature of SolarMarker is its ability to propagate within a network, potentially compromising multiple devices and entire infrastructures. This poses a significant threat to businesses and enterprises.
To protect against SolarMarker and similar threats, it is crucial to implement robust cybersecurity measures. These include keeping software and systems up to date, using strong and unique passwords, deploying reliable anti-malware solutions, and providing user education on phishing and online safety practices.
In its recent campaign, SolarMarker comes bundled with legitimate software named Autodesk and uses it as a decoy.
Impact
- Sensitive Information Theft
- Credential Theft
Indicators of Compromise
IP
- 68.233.238.123
MD5
- 0435a86a984c46c27a96f0ef45c8f195
- fa07b1b0d82a8de8ba2033de4f4f4280
- a3702ee26db2a712bf1cc35e2361ce93
- 98b925951c204782c9ddfeca3570a11d
SHA-256
- 96512386ea92612cd3c09c377f6a62e1df7a940ce4e46ca5562d75a1017413c9
- ba00fdc92ceaa66612cda52a770bda7961f8cee511e714b6db208583e9f40729
- 6d254c4ff86f1aa524250f99e2ea628093380c483b710332885d57202c2e6758
- 16a60b1091c521261f9fc3712baec729bebb08ca82564843bcb96db35841ad0b
SHA1
- 17a5002a1ab8e5acbcc7a04cd329704b400ec403
- 0b84d93d4e1611730c5f23e09b137af1b9757578
- be07f3d9353d398b3b331a4cf7663552f8c9ce54
- 618de81a116d3dc897a61fad0ac871978f6b587f
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enabling two-factor authentication (2FA) on your accounts adds an extra layer of security and can help prevent unauthorized access even if your login credentials have been stolen.
- Regularly backing up your important data can help ensure that you don't lose any critical information in the event of a malware infection or other data loss event.
- Be wary of emails, attachments, and links from unknown sources. Also, avoid downloading software from untrusted sources or clicking on suspicious ads or pop-ups.
- Make sure all of your software, including your operating system and applications, is up-to-date with the latest security patches. This can help prevent vulnerabilities that could be exploited by SolarMarker Stealer and other types of malware.