Rewterz
Multiple Apache Products Vulnerabilities
July 8, 2024
Rewterz
Popular Gogs Open-Source Git Service Reveals Critical Unpatched Vulnerabilities
July 8, 2024

APT Group Turla – Active IOCs

Severity

High

Analysis Summary

The APT group Turla is known by many names including Krypton, MAKERSMARK, Snake, Uroburosk, Venomous Bear, Waterbug, and WhiteBear, and is tracked by researchers. Turla is primarily known for its espionage activities. This time they're back with another malicious sample dropping malicious exe file samples to different users. Believed to be sponsored by the Russian FSB security service, Turla has been active since at least 2008 and while constantly evolving its toolkit, has also been turning its attention towards the infrastructure and resources of other APTs.

Impact

  • Information Theft
  • Cyber Espionage

Indicators of Compromise

Domain Name

  • ies.inquirer.com.ph

MD5

  • 005c762a3c39b1114c6521f52acb66c3
  • 1c024b92f8e164e031fe5e4fff77ea61
  • 371ef30b422378d95f64804391f24818
  • a88597f35bf778f4a0c21d7f231c9091

SHA-256

  • cac4d4364d20fa343bf681f6544b31995a57d8f69ee606c4675db60be5ae8775
  • c2618fb013135485f9f9aa27983df3371dfdcb7beecde86d02cee0c258d5ed7f
  • b6abbeab6e000036c6cdffc57c096d796397263e280ea264eba73ac5bab39441
  • 7091ce97fb5906680c1b09558bafdf9681a81f5f524677b90fd0f7fc0a05bc00

SHA1

  • 19d576e1a7c0c7e6dae6dce79743db5f2defa79f
  • 3b1adffb8605760af23c3b480825e02ceaf836d6
  • 47791e973dc71e23de8635d801509149d9d74288
  • bcbdff86daeb92215081dffc8660900816159721

URL

  • https://ies.inquirer.com.ph/advprod03/assets/images/Advisory23-UCDMS04-11-01.zip
  • http://files.philbendeck.com/file/
  • http://files.philbendeck.com/help/
  • http://files.philbendeck.com/article/
  • http://files.philbendeck.com/about/

Remediation

  • Block all threat indicators at your respective controls.
  • Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
  • Conduct regular security awareness training to educate employees about phishing threats and safe email practices.
  • Enable multi-factor authentication (MFA) to strengthen account security and prevent unauthorized access.
  • Implement robust email filtering mechanisms to identify and block phishing emails, reducing the risk of malware delivery.
  • Ensure timely updates and patches for all software, including Microsoft Exchange servers, to address known vulnerabilities.
  • Segregate critical systems and sensitive data from the rest of the network through network segmentation to limit lateral movement.
  • Deploy comprehensive endpoint protection solutions to detect and block malware and ransomware, safeguarding devices from compromise.
  • Collaborate with cybersecurity organizations and law enforcement agencies to share threat intelligence and stay informed about emerging threats.
  • Develop and regularly update an incident response plan to efficiently handle cyber attacks, reducing downtime and minimizing the impact of a breach.