“Stealc” – An Information Stealer Malware – Active IOCs
August 22, 2024North Korean Threat Groups Linked to New macOS Malware ‘TodoSwift’ – Active IOCs
August 22, 2024“Stealc” – An Information Stealer Malware – Active IOCs
August 22, 2024North Korean Threat Groups Linked to New macOS Malware ‘TodoSwift’ – Active IOCs
August 22, 2024Severity
High
Analysis Summary
The BlackMoon Trojan, also known as KRBanker, initially emerged in late September 2015, targeting South Korean banks using a "pharming" technique. This method redirected users attempting to access legitimate banking sites to forged websites, where they were prompted to enter their credentials, allowing cybercriminals to steal this information.
Recently, researchers have identified a more sophisticated and staged campaign using the BlackMoon Trojan, originating in November 2022. This new campaign primarily targets businesses in the USA and Canada, focusing on evasion and persistence techniques to drop various unwanted programs and maintain a presence in victims' environments for extended periods, rather than stealing credentials.
Impact
- Data Exfiltration
- Credential Theft
- Financial Loss
Indicators of Compromise
MD5
- fea1d804bacb0646a154e316ae0a0967
- a935bb3143363c1e83dbb323f42b66f0
SHA-256
- ae41de76187927b7c46ea9bd4a0d9827c2f4b36545de6de89c12b25eb1e21fb6
- e3a2778322ac4ddfbf4a9b2cb7d9921e996f857ecc50344b6248cf2e5394c756
SHA-1
- 2c866f8ebb080f7f04a74274d746fe78e8c0fd64
- 36ef334a751d3a86933ad771119f72e221ff2244
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.