

Multiple Apache Products Vulnerabilities
July 8, 2024
Popular Gogs Open-Source Git Service Reveals Critical Unpatched Vulnerabilities
July 8, 2024
Multiple Apache Products Vulnerabilities
July 8, 2024
Popular Gogs Open-Source Git Service Reveals Critical Unpatched Vulnerabilities
July 8, 2024Severity
High
Analysis Summary
The APT group Turla is known by many names including Krypton, MAKERSMARK, Snake, Uroburosk, Venomous Bear, Waterbug, and WhiteBear, and is tracked by researchers. Turla is primarily known for its espionage activities. This time they're back with another malicious sample dropping malicious exe file samples to different users. Believed to be sponsored by the Russian FSB security service, Turla has been active since at least 2008 and while constantly evolving its toolkit, has also been turning its attention towards the infrastructure and resources of other APTs.
Impact
- Information Theft
- Cyber Espionage
Indicators of Compromise
Domain Name
- ies.inquirer.com.ph
MD5
- 005c762a3c39b1114c6521f52acb66c3
- 1c024b92f8e164e031fe5e4fff77ea61
- 371ef30b422378d95f64804391f24818
- a88597f35bf778f4a0c21d7f231c9091
SHA-256
- cac4d4364d20fa343bf681f6544b31995a57d8f69ee606c4675db60be5ae8775
- c2618fb013135485f9f9aa27983df3371dfdcb7beecde86d02cee0c258d5ed7f
- b6abbeab6e000036c6cdffc57c096d796397263e280ea264eba73ac5bab39441
- 7091ce97fb5906680c1b09558bafdf9681a81f5f524677b90fd0f7fc0a05bc00
SHA1
- 19d576e1a7c0c7e6dae6dce79743db5f2defa79f
- 3b1adffb8605760af23c3b480825e02ceaf836d6
- 47791e973dc71e23de8635d801509149d9d74288
- bcbdff86daeb92215081dffc8660900816159721
URL
- https://ies.inquirer.com.ph/advprod03/assets/images/Advisory23-UCDMS04-11-01.zip
- http://files.philbendeck.com/file/
- http://files.philbendeck.com/help/
- http://files.philbendeck.com/article/
- http://files.philbendeck.com/about/
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Conduct regular security awareness training to educate employees about phishing threats and safe email practices.
- Enable multi-factor authentication (MFA) to strengthen account security and prevent unauthorized access.
- Implement robust email filtering mechanisms to identify and block phishing emails, reducing the risk of malware delivery.
- Ensure timely updates and patches for all software, including Microsoft Exchange servers, to address known vulnerabilities.
- Segregate critical systems and sensitive data from the rest of the network through network segmentation to limit lateral movement.
- Deploy comprehensive endpoint protection solutions to detect and block malware and ransomware, safeguarding devices from compromise.
- Collaborate with cybersecurity organizations and law enforcement agencies to share threat intelligence and stay informed about emerging threats.
- Develop and regularly update an incident response plan to efficiently handle cyber attacks, reducing downtime and minimizing the impact of a breach.