❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayCisco Talos

IR Q4 2023 trends: Significant increase in ransomware activity found in engagements, while education remains one of the most-targeted sectors

24 January 2024 at 13:00

First time ransomware was the top threat in 2023, according to Q4 2023 Talos Incident Response report

IR Q4 2023 trends: Significant increase in ransomware activity found in engagements, while education remains one of the most-targeted sectors

Ransomware, including pre-ransomware activity, was the top observed threat in the fourth quarter of 2023, accounting for 28 percent of engagements, according to Cisco Talos Incident Response (Talos IR), notably a 17 percent increase from the previous quarter.Β 

Talos IR observed operations involving Play, Cactus, BlackSuit and NoEscape ransomware for the first time this quarter.Β 

As reflected in Talos IR’s quarterly report for the third quarter of 2024, the team responded to many incidents with miscellaneous post-compromise activity, though these attacks were limited in scale and contained by security efforts early in the attack chain before the adversary’s objectives could be fully determined. Other substantial threats this quarter included an insider threat attack and phishing campaigns, including a phishing cluster using malicious QR codes.Β 

IR Q4 2023 trends: Significant increase in ransomware activity found in engagements, while education remains one of the most-targeted sectors

Education and manufacturing were tied for the most targeted verticals, together accounting for nearly 50 percent of the total number of incident response engagements, closely followed by healthcare and public administration.β€―Compared to last quarter, we observed only a slight increase in engagements targeting the education sector while there was a 10 percent increase in engagements affecting the manufacturing vertical.

Adversaries commonly target entities in the education sector to conduct ransomware attacks or access sensitive student and faculty personally identifiable information (PII), such as financial data and credentials. Schools with limited cybersecurity capabilities and constrained resources are often the most vulnerable, as security remains a cost center. However, the opportunistic targeting employed by adversaries can still put school districts with robust cybersecurity programs at risk. Exfiltrated PII data remains an attractive target that is leveraged for follow-on attacks, sold on dark web forums, or used for monetary theft.Β 

The manufacturing sector faces unique challenges due to its inherently low tolerance for operational downtime. The sector's crucial role in producing goods fundamental to various other critical infrastructure sectors means that any disruption in manufacturing processes not only affects the industry itself but may have cascading effects on the supply chain and dependent sectors. Supply chain attacks are a concern for the manufacturing sector, as such incidents can create unstable supply chain conditions that require immediate attention and action to protect assets, operations and/or reputation.

IR Q4 2023 trends: Significant increase in ransomware activity found in engagements, while education remains one of the most-targeted sectors

Ransomware activity increases

Play ransomware

Talos IR responded to a Play ransomware attack for the first time this quarter where adversaries used the legitimate remote access software AnyDesk to deepen their access and remain persistent. The adversaries used PsExec, an IT administration utility that allows users to execute programs on another computer, to disable security tools across multiple endpoints, likely to evade detection. After collecting credentials from various locations such as the Windows Registry, the attackers were able to compromise multiple domain controllers which were used to deploy ransomware across the environment.Β 

In another Play ransomware engagement, Talos IR assessed with low confidence that after obtaining user credentials, the attackers attempted to bypass multi-factor authentication (MFA) by calling the organization’s help desk to register a new MFA device. This is an example of β€œvishing,” a social engineering technique in which attackers try to trick victims over the phone. While Talos is aware of other ransomware and cybercriminal groups who use vishing to gain initial access, it is not a technique we had previously associated with Play ransomware affiliates. Attackers also leveraged the open-source Windows password spraying tool SharpSpray and IP addresses associated with SurfShark and BlueVPS virtual private network (VPN) and virtual private server (VPS) providers. These methods and tools leveraged by Play affiliates are not well-documented in open-source reporting, suggesting these may be newly adopted techniques.Β Β 

πŸŽ₯
Want to hear these insights directly from our Talos Incident Responders? Watch the latest On Air video below!

Once inside the network, the adversaries executed several enumeration commands, such as "whoami" and "net group /domain," which provide information about the system owner and permission groups. Next, they dumped credentials from the memory of the Local Security Authority Subsystem Service (LSASS) and moved laterally by abusing Remote Desktop Protocol (RDP). A combination of the archive tool WinRAR and the open-source file transfer protocol (FTP) tool WinSCP was used for data exfiltration. Talos IR identified several persistence mechanisms deployed by the threat actors, including scheduled tasks and registry startup items. Before the execution of the ransomware binary, the attackers disabled several security tools and deleted the volume shadow copies to evade detection and inhibit system recovery.Β 

First discovered in June 2022, Play (also known as Playcrypt) ransomware group has targeted over 300 organizations across the globe within the public and private sectors. Play affiliates typically compromise victim networks and append the β€œ.PLAY” extension when encrypting files. Initial access vectors leveraged in Play attacks vary from social engineering to exploiting vulnerabilities in public-facing applications.

BlackSuit ransomware

In a ransomware engagement, Talos IR responded to a BlackSuit ransomware incident for the first time where threat actors used stolen VPN credentials to gain access to an account that did not have MFA enabled. Attackers enumerated the network and permission groups before dumping credentials from memory with the credential harvesting tool Mimikatz. Attackers exploited the privilege escalation vulnerability dubbed "ZeroLogon," tracked as CVE-2020-1472, which allows remote unauthenticated attackers to access domain controllers and obtain domain administrator access. The legitimate remote access software ScreenConnect was also used for command and control (C2) communication throughout the attack.Β 

First discovered in May 2023, BlackSuit ransomware is suspected to be a rebrand of the Royal ransomware operation. Royal, first discovered in September 2022, was hypothesized to be the successor to the Conti ransomware operation that voluntarily shut down in May 2022. Royal and Conti were known for heavily targeting several critical infrastructure sectors, including manufacturing, healthcare and public health (HPH), and education. The BlackSuit ransomware operation has followed this pattern and has been heavily targeting the education sector throughout 2023, which will likely continue into 2024 as the group has already posted a victim in the education industry since the start of the new year.Β 

Cactus ransomware

Talos IR responded to a Cactus ransomware attack for the first time this quarter in an engagement where the adversaries gained access using compromised credentials for a VPN account that was not secured with MFA. Throughout the attack, the adversaries created multiple accounts and added them to the administrator's group, which were then used to evade detection, escalate privileges, and remain persistent in the environment. Attackers moved laterally in the environment by abusing RDP, scheduled tasks, and Windows Management Instrumentation Command (WMIC), techniques commonly observed across similar ransomware attacks. The security registry key file, which contains account policies, user permissions, and encrypted versions of passwords, was duplicated by the threat actors but renamed backward to β€œytiruces.” By copying this file, attackers might be trying to maintain access to the credentials, which they can decrypt and use later. Talos IR observed a few other duplicate registry files with reverse names, which could have been a tactic used to mark files that have already been exfiltrated or analyzed.

First discovered in March 2023, Cactus works as a ransomware-as-a-service (RaaS) and is known to exploit vulnerabilities and leverage malvertising lures for initial access. Cactus ransomware targeting and victimology appear to be opportunistic and indiscriminate, appending the file extension β€œ.cts1” to the end of encrypted files, with the numerical value varying between victims. Talos IR observed Cactus ransomware affiliates using custom scripts to disable security tools and distribute the ransomware.Β 

NoEscape ransomware

Talos IR also responded to NoEscape ransomware for the first time this quarter in an engagement in which threat actors leveraged the β€œCitrix Bleed” authentication bypass vulnerability in Citrix NetScaler web application delivery control (ADC) and Gateway appliances, which Citrix released a patch for in October 2023. Tracked as CVE-2023-4966, this vulnerability allows attackers to bypass password and MFA requirements by obtaining session tokens. While exploitation of CVE-2023-4966 represents a new vulnerability leveraged by NoEscape ransomware affiliates, the targeting of Citrix Bleed is consistent with the group’s previous attacks against virtual desktop infrastructure, and appears to be part of a broader mass campaign initially led by LockBit 3.0 ransomware affiliates. In addition to patching affected systems, Talos also recommends invalidating all active session tokens because if any of the session tokens are stolen they can still be abused by attackers leaving the organization vulnerable to attacks.Β 

After the NoEscape affiliate gained access to the environment, they installed several persistence mechanisms including the ITarian remote monitoring and management (RMM) solution, a remote access utility Talos IR has not previously seen ransomware affiliates use. The adversary leveraged the access granted by ITarian and other tools to steal additional privileged credentials and lay the groundwork for future ransomware deployment. ITarian is highly similar to other RMMs commonly seen in Talos IR ransomware engagements such as TeamViewer, Atera, AnyDesk and Syncro that can access files or workstations remotely. The affiliate also used several other tools commonly seen in pre-ransomware activities, including Cobalt Strike and Sliver, two penetration testing and red team toolkits frequently used for persistence, code execution and lateral movement. The use of Sliver is interesting in that Talos IR has not seen it used in ransomware attack chains since late 2022. The Sliver implants were packed using PEzor, a tool that obfuscates the executables’ contents to prevent anti-virus detection and blocking. Attackers leveraged PsExec to copy and execute two ransomware payloads across the network.Β 

NoEscape is a RaaS that emerged in May 2023 and has used multiple extortion tactics including data theft and distributed denial-of-service (DDoS) attacks to coerce payments from victims. NoEscape operates a profit-sharing model where the ransom proceeds are split between the ransomware’s developers and the affiliates/customers who pay to use it. Consistent with many RaaS groups, NoEscape has indiscriminately targeted organizations of all sizes across many different industries. In December 2023, Talos began monitoring claims on the dark web that NoEscape’s developers executed an β€œexit scam” in which they stole several of their affiliates' deposits and ransom payouts before possibly shutting down their operation. NoEscape’s leak site was taken down on Dec. 9, 2023, and continues to be offline.Β 

On Dec. 19, 2023, the Federal Bureau of Investigation (FBI) announced a disruption campaign against the ALPHV (BlackCat) ransomware operation, which had been active since late 2021. Although not observed by Talos IR this quarter, ALPHV was one of the most prolific ransomware groups in 2023 following LockBit ransomware. Talos assesses recent law enforcement efforts that may divert additional resources to the LockBit ransomware group, significantly improving their capabilities. Notably, the LockBit ransomware group posted on a Russian-speaking dark web forum in December 2023 offering to recruit ALPHV and NoEscape affiliates as well as any of the ALPHV developers. With a current lack of intelligence regarding this new strategy, it is too early to determine if any of the prospective ALPHV affiliates considered, or moved over to LockBit. However, if ALPHV and LockBit were to collaborate, this potential amalgamation of tactics, techniques and operational capabilities would likely result in more potent and evasive ransomware variants, complicating detection and mitigation efforts, and likely significantly altering the ransomware landscape as we move through the new year.Β 

Other observed threats

In an insider threat engagement, a disgruntled former employee whose account was not properly decommissioned remotely removed all configurations on a network switch before rebooting it, which functionally restored the switch to its factory default configuration. A switch is a piece of hardware that connects network devices and helps manage all of the traffic. When a switch fails, it can lead to network downtime, loss of productivity, and potentially expose the network to security risks. Talos recommends organizations implement secure off-boarding procedures to protect the confidentiality, integrity and availability of sensitive data.Β 

In one cluster of phishing activity, several employees received spear phishing emails with malicious QR codes that, when scanned, led to a fake Microsoft 365 sign-in page, consistent with a growing trend in public reporting. Once the attackers obtained stolen credentials, they proceeded to use an MFA exhaustion attack that resulted in some employees approving the push notifications on their mobile devices. In an MFA exhaustion attack, an adversary hopes to overwhelm users with MFA push notifications in hopes they will inadvertently grant access.Β 

Phishing attacks leveraging QR codes are concerning because if successful, employees will likely use their mobile devices, which leads defenders to lose visibility. Additionally, most email security solutions, such as secure email gateways (SEGs), cannot detect malicious QR codes. With remote work expanding after the COVID-19 pandemic, more employees are accessing business information from their mobile devices. According to a 2023 report, by cybersecurity firm Agency, 97 percent of respondents access their work accounts from their devices. Talos recommends organizations deploy a mobile device management (MDM) platform or similar mobile security tool, such as Cisco Umbrella, to all unmanaged mobile devices that have access to business information.Β 

There was a significant increase in QR code phishing in 2023, according to public reporting. Talos IR responded to a QR code phishing campaign for the first time in an engagement where threat actors tricked victims into scanning malicious QR codes embedded in phishing emails with their mobile devices, thereby leading to malware being executed on the mobile devices. As a result, the attack surface shifts as enterprise security protocols and monitoring systems have less control and visibility over personal devices compared to corporate-managed hardware outside of corporate networks. Additionally, most email security solutions, such as secure email gateways (SEGs) are currently unable to detect malicious QR codes.

Initial accessΒ 

The top observed means of gaining initial access was tied between using compromised credentials on valid accounts and exploiting public-facing applications, each accounting for 28 percent of engagements, closely followed by phishing. In the phishing engagements this quarter, Talos IR observed a mix of malicious links and QR codes leading to fake login sites crafted to steal credentials.Β 

IR Q4 2023 trends: Significant increase in ransomware activity found in engagements, while education remains one of the most-targeted sectors

Security weaknesses

A lack of MFA or proper MFA implementation across all user accounts as well as misconfigured or unpatched systems each played a part in 36 percent of the engagements Talos IR responded to this quarter. Talos IR frequently observes attacks that could have been prevented if MFA was enabled on critical services, such as RDP. Talos IR recommends expanding MFA for all user accounts (e.g., employees, contractors, business partners, etc.).Β 

In some engagements, adversaries attempted to bypass MFA with MFA exhaustion, or fatigue, attacks. Users must have a clear understanding of the appropriate business response protocols when their devices are overwhelmed with an excessive volume of push notifications. We recommend organizations educate their employees about the specific channels and points of contact for reporting these incidents. Prompt and accurate reporting enables security teams to quickly identify the nature of the issue, and implement the necessary measures to address the situation effectively.

Staying up to date with software updates is a crucial aspect of an organization’s security posture, as outdated systems present exploitable avenues for attackers to leverage. Attackers often exploit these software vulnerabilities to achieve a multitude of post-compromise objectives, such as privilege escalation and lateral movement. While vulnerability and patch management are critical, it is not always possible to immediately apply every security patch due to the complexity of enterprise networks. Talos IR recommends prioritizing vulnerabilities that pose the biggest threats to prevent exploitation.Β 

Top observed MITRE ATT&CK techniques

The table below represents the MITRE ATT&CK techniques observed in this quarter’s Talos IR engagements and includes relevant examples. Given that some techniques can fall under multiple tactics, we grouped them under the most relevant tactic based on the way they were leveraged. Please note, this is not an exhaustive list.Β 

Key findings from the MITRE ATT&CK framework include:Β 

  • Exploitation of public-facing applications was one of the top observed means of gaining initial access this quarter, accounting for 28 percent of total engagements, a slight increase from the previous quarter.
  • Remote access software, such as ScreenConnect, SplashTop and AnyDesk were used in nearly a fourth of engagements this quarter.Β 
  • Indicator removal, such as clearing Windows event logs and file deletion, was the top defense evasion technique observed.
  • In 24 percent of engagements, attackers abused remote services, such as RDP, SSH, and SMB, to move laterally.Β Β 

Initial Access (TA0001)

Example

T1190 Exploit Public-Facing Application

Attackers successfully exploited a vulnerable application that was publicly exposed to the Internetβ€―Β 

T1078 Valid Accounts

Adversary leveraged stolen or compromised credentials

T1566 Phishing

Malicious email sent to trick users into downloading malware

Execution (TA0002)

Example

T1059.001 Command and Scripting Interpreter: PowerShell

Executes PowerShell code to retrieve information about the client’s Active Directory environment

T1059.003 Command and Control Scripting Interpreter: Windows Command Shell

Web shells can run commands on the compromised machine

Persistence (TA0003)

Example

T1053.005 Scheduled Task / Job: Scheduled Task

Scheduled tasks were created on a compromised server

T1136 Create Account

Created a user to add to the local administrator’s group

T1133 External Remote Services


Adversaries use compromised credentials to log into VPNs

Defense Evasion (TA0005)

Example

T1218.011 System Binary Proxy Execution: Rundll32

Attackers can execute malicious DLL files with Rundll32

T1134.002 Access Token Manipulation: Create Process with Token

Attackers created a new process using the command β€œrun as”

T1562.001 Impair Defenses: Disable or Modify Tools

Attackers can disable Windows Defender

Credential Access (TA0006)

Example

T1003.001 OS Credential Dumping: LSASS Memory

Use β€œlsass.exe” for stealing password hashes from memory

T1003.003 OS Credential Dumping

Use NTDSDump to gather credentials

Discovery (TA0007)

Example

T1018 Remote System Discovery

Adversaries may use ping to discover remote systems

T1482 Domain Trust Discovery

Attackers may obtain information on domain trust relationships

Lateral Movement (TA0008)

Example

T1210 Exploitation of Remote Services

Attackers can abuse remote services, such as RDP

T1021.004 Remote Services: SSH

Adversary made attempts to move laterally using SSH

Collection (TA0009)

Example

T1005 Data from Local System

Attackers can collect and stage data for later exfiltration from infected machines

T1560 Archive Collected Data

Attackers can archive staged data using WinRAR

Command and Control (TA0011)

Example

T1219 Remote Access Software

Remote access tools found on the compromised systemβ€―β€―

T1105 Ingress Tool Transfer

Attackers can use PowerShell commands, such as β€œInvoke-WebRequest” to transfer tools from an external system

Exfiltration (TA0010)

Example

T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol

Using FTP for file exfiltration

T1041 Exfiltration Over C2 Channel

Adversaries may steal data over existing C2 channels

Impact (TA0040)

Example

T1486 Data Encrypted for Impact

Deploy Cactus ransomware and encrypt critical systems

T1486 Inhibit System Recovery

Deleting shadow volume copies before ransomware execution

Talos IR trends: BEC attacks surge, while weaknesses in MFA persist

25 April 2024 at 12:00
Talos IR trends: BEC attacks surge, while weaknesses in MFA persist

Business email compromise (BEC) was the top threat observed by Cisco Talos Incident Response (Talos IR) in the first quarter of 2024, accounting for nearly half of engagements, which is more than double what was observed in the previous quarter.Β Β 

The most observed means of gaining initial access was the use of compromised credentials on valid accounts, which accounted for 29 percent of engagements. The high number of BEC attacks likely played a significant role in valid accounts being the top attack vector this quarter. Weaknesses involving multi-factor authentication (MFA) were observed within nearly half of engagements this quarter, with the top observed weakness being users accepting unauthorized push notifications, occurring within 25 percent of engagements.Β Β 

There was a slight decrease in ransomware this quarter, accounting for 17 percent of engagements. Talos IR responded to new variants of Phobos and Akira ransomware for the first time this quarter.Β 

Talos IR trends: BEC attacks surge, while weaknesses in MFA persist

Manufacturing was the most targeted vertical this quarter, closely followed by education, a continuation from Q4 2024 where manufacturing and education were also two of the most targeted verticals. There was a 20 percent increase in manufacturing engagements from the previous quarter.Β 

The manufacturing sector faces unique challenges due to its inherently low tolerance for operational downtime. This quarter, Talos IR observed a wide range of threat activity targeting manufacturing organizations including financially motivated attacks, such as BEC and ransomware, and some brute force activity targeting virtual private network (VPN) infrastructure. The use of compromised credentials on valid accounts was the top observed attack vector within attacks targeting the manufacturing sector this quarter, which represents a change from the previous quarter when the top attack vector observed in these types of engagements was exploiting vulnerabilities in public-facing applications.Β Β Β 

Talos IR trends: BEC attacks surge, while weaknesses in MFA persist

Watch discussion on the report's biggest trends

Surge in BECΒ 

Within BEC attacks, adversaries will send phishing emails appearing to be from a known or reputable source making a valid request, such as updating payroll direct deposit information. BEC attacks can have many motivations, often financially driven, aimed at tricking organizations into transferring funds or sensitive information to malicious actors.Β Β 

BEC offers adversaries the advantage of impersonating trusted contacts to facilitate internal spearphishing attacks that can bypass traditional external defenses and increase the likelihood of deception, widespread malware infections and data theft.Β 

In one engagement, adversaries performed a password-spraying attack and MFA exhaustion attacks against several employee accounts. There was a lack of proper MFA implementation across all the impacted accounts, leading to the adversaries gaining access to at least two accounts using single-factor authentication. The organization detected and disrupted the attack before adversaries could further their access or perform additional post-compromise activities.Β Β Β Β 

In another cluster of activity, several employees received spear-phishing emails that contained links that, when clicked, led to a redirection chain of web pages ultimately landing on a legitimate single sign-on (SSO) prompt that was pre-populated with each victim’s email address. The attack was unsuccessful because none of the employees interacted with the email, which was likely due to multiple red flags. For example, the email was unexpected and sent from an external email address, and there was small text within the email that referred to the email as a fax, which was all indicators of a phishing attempt.Β 

Ransomware trendsΒ 

Ransomware accounted for 17 percent of engagements this quarter, an 11 percent decrease from the previous quarter. Talos IR observed new variants of Akira and Phobos ransomware for the first time this quarter.Β 

AkiraΒ 

Talos IR responded to an Akira ransomware attack for the first time this quarter in an engagement where affiliates deployed the latest ESXi version, β€œAkira_v2,” as well as a Windows-based variant of Akira named β€œMegazord.” These new Akira variants are written in the Rust programming language, which is a notable change from the previously used C++ and Crypto++ programming languages.Β Β 

Talos IR could not determine how initial access was gained, which is common because ransomware attacks often involve multi-stage attack strategies that add additional complexity during the investigation process. Once inside the network, the adversaries began collecting credentials from the memory of the Local Security Authority Subsystem Service (LSASS) and the New Technology Directory Services Directory Information Tree (NTDS.dit) database, where Active Directory data is stored, and leveraged Remote Desktop Protocol (RDP) for lateral movement. Prior to encryption, Megazord ransomware began executing several commands to disable tools and impair defenses, including β€œnet stop” and β€œtaskkill.” Akira_v2 appended the file extension β€œ.akiranew” during encryption, while Megazord ransomware appended the file extension β€œ.powerranges”.Β Β Β 

First discovered in early 2023, Akira operates as a ransomware-as-a-service (RaaS) model and employs a double extortion scheme that involves exfiltrating data before encryption. Akira affiliates are known to heavily target small- to medium-sized businesses within several verticals primarily located within the U.S. but have targeted organizations within the U.K., Canada, Iceland, Australia and South Korea. Akira affiliates are notorious for leveraging compromised credentials and exploiting vulnerabilities as a means of gaining initial access, such as the SQL injection vulnerability, tracked as CVE-2021-27876, affecting certain versions of Zoho ManageEngine ADSelfService Plus, and the vulnerability, tracked as CVE-2023-27532, affecting certain versions of Veeam’s Backup & Replication (VBS) software.Β Β Β Β 

PhobosΒ 

Talos IR has previously observed variants of Phobos ransomware, such as β€œFaust,” but this quarter, Talos IR responded to an engagement with the β€œBackMyData” variant of Phobos ransomware. The adversaries leveraged Mimikatz to dump credentials from Active Directory. The adversary also installed several tools in the NirSoft product suite designed to recover passwords, such as PasswordFox and ChromePass, for additional credential enumeration.Β 

The adversaries used PsExec to access the domain controller before setting a registry key to permit remote desktop connections. Shortly after, the adversaries also modified the firewall to allow remote desktop connections using the Windows scripting utility, netsh. The remote access tool AnyDesk was downloaded to enable remote access as a means of persistence in the environment. Talos IR assessed with high confidence that Windows Secure Copy (WinSCP) and Secure Shell (SSH) were likely used to exfiltrate staged data. Adversaries also relied on PsExec to execute commands, such as deleting volume shadow copies, as a precursor to deploying the ransomware executable. After encryption, the ransomware appended the file extension β€œ.fastbackdata”.Β Β Β 

A notable finding was the persistent use of the β€œUsers/[username]/Music” directory as a staging area for data exfiltration to host malicious scripts, tools and malware, a common technique used by numerous ransomware affiliates to evade detection and remain persistent in the environment. Talos IR also identified a digitally signed executable, β€œHRSword,” developed by Beijing Huorong Network Technology. It is a tool the affiliate used during the attack for potential secure file deletion and as a defensive measure to disable endpoint protection tools, which Phobos affiliates were previously using, according to public reporting.Β  Β 

Phobos ransomware first emerged in late 2018 and shared many similarities with the Crysis and Dharma ransomware families. Unlike other ransomware families, there are many variants of Phobos ransomware, such as Eking, Eight, Elbie, Devos and Faust. There is little information known about the business model leveraged by the Phobos ransomware operation. In November 2023, Cisco Talos analyzed over a thousand samples of Phobos ransomware to learn more about the affiliate structure and activity, which revealed that Phobos may operate a RaaS model due to the hundreds of contact emails and IDs associated with Phobos campaigns, indicating the malware has a dispersed affiliate base. Talos assessed with moderate confidence that the Phobos ransomware operation is actively managed by a central authority, as there is only one private key capable of decryption in all observed campaigns.Β 

Other observed threatsΒ Β 

Talos IR responded to an attack where adversaries were attempting to brute force several Cisco Adaptive Security Appliances (ASAs). Although the adversaries were unsuccessful in their attack, this activity is in line with the recently observed trend affecting VPN services.Β 

Cisco Talos has recently seen an increase in malicious activity targeting VPN services, web application authentication interfaces, and Secure Shell (SSH) globally. Since at least March 18, Cisco has observed scanning and brute force activity sourcing from The Onion Router (TOR) exit nodes and other anonymous tunnels and proxies.Β 

Depending on the target environment, a successful attack could result in unauthorized access to a target network, possibly leading to account lockouts and denial-of-service (DoS) conditions. The brute force attempts include a combination of generic usernames and valid usernames unique to specific organizations. The activity seems indiscriminate and has been observed across multiple industry verticals and geographic regions.Β 

Initial vectorsΒ 

The most observed means of gaining initial access was the use of compromised credentials on valid accounts, accounting for 29 percent of engagements, a continuation of a trend from the previous quarter when valid accounts were also a top attack vector.Β 

Talos IR trends: BEC attacks surge, while weaknesses in MFA persist

Security weaknessesΒ 

For the first time, users accepting unauthorized MFA push notifications was the top observed security weakness, accounting for 25 percent of engagements this quarter. The lack of proper MFA implementation closely followed, accounting for 21 percent of engagements, a 44 percent decrease from the previous quarter.Β 

Users must have a clear understanding of the appropriate business response protocols when their devices are overwhelmed with an excessive volume of push notifications. Talos IR recommends organizations educate their employees about the specific channels and points of contact for reporting these incidents. Prompt and accurate reporting enables security teams to quickly identify the nature of the issue and implement the necessary measures to address the situation effectively. Organizations should also consider implementing number-matching in MFA applications to provide an additional layer of security to prevent users from accepting malicious MFA push notifications.Β 

Talos IR recommends implementing MFA on all critical services including all remote access and identity access management (IAM) services. MFA will be the most effective method for the prevention of remote-based compromises. It also prevents lateral movement by requiring all administrative users to provide a second form of authentication. Organizations can set up alerting for single-factor authentication to quickly identify potential gaps.Β 

Top observed MITRE ATT&CK techniquesΒ 

The table below represents the MITRE ATT&CK techniques observed in this quarter’s IR engagements and includes relevant examples and the number of times seen. Given that some techniques can fall under multiple tactics, we grouped them under the most relevant tactic based on the way they were leveraged. Please note, this is not an exhaustive list.Β 

Key findings from the MITRE ATT&CK framework include:Β Β 

  • Remote access software, such as SplashTop and AnyDesk, were used in 17 percent of engagements this quarter, a 20 percent decrease from the previous quarter.Β Β 
  • The use of email hiding rules was the top observed defense evasion technique, accounting for 21 percent of engagements this quarter.Β  Β 
  • Scheduled tasks were leveraged by adversaries the most this quarter for persistence, accounting for 17 percent of engagements this quarter, a 33 percent increase from the previous quarter.Β Β 
  • The abuse of remote services, such as RDP, SSH, SMB and WinRM, more than doubled this quarter compared to the previous quarter, accounting for nearly 60 percent of engagements.Β 

ReconnaissanceΒ 

ExampleΒ 

T1589.001 Gather Victim Identity Information: CredentialsΒ 

Adversaries may gather credentials that can be used during their attack.Β Β 

T1598.003 Phishing for Information: Spearphishing LinkΒ 

Adversaries may send a spearphishing email with a link to a credential harvesting page to collect credentials for their attack.Β 

Resource DevelopmentΒ 

ExampleΒ 

T1586.002 Compromise Accounts: Email AccountsΒ 

Adversaries may compromise email accounts that can be used during their attack for malicious activities, such as internal spearphishing.Β 

T1583.001 Acquire Infrastructure: DomainsΒ 

Adversaries may acquire domains that can be used for malicious activities, such as hosting malware.Β 

T1608.001 Stage Capabilities: Upload MalwareΒ 

Adversaries may upload malware to compromised domains to make it accessible during their attack.Β Β 

T1583.008 Acquire Infrastructure: MalvertisingΒ 

Adversaries may purchase online advertisements, such as Google ads, that can be used distribute malware to victims.Β 

T1608.004 Stage Capabilities: Drive-by TargetΒ 

Adversaries may prepare a website for drive-by compromise by inserting malicious JavaScript.Β Β 

Initial AccessΒ 

ExampleΒ 

T1078 Valid AccountsΒ 

Adversaries may use compromised credentials to access valid accounts during their attack.Β 

T1566 PhishingΒ 

Adversaries may send phishing messages to gain access to target systems.Β 

T1189 Drive-by CompromiseΒ 

Victims may infect their systems with malware over browsing, providing an adversary with access.Β Β 

T1190 Exploit in Public-Facing ApplicationΒ 

Adversaries may exploit a vulnerability to gain access to a target system.Β 

T1566.002 Phishing: Spearphishing LinkΒ 

Adversaries may send phishing emails with malicious links to lure victims into installing malware.Β Β 

ExecutionΒ 

ExampleΒ 

T1059.001 Command and Scripting Interpreter: PowerShellΒ 

Adversaries may abuse PowerShell to execute commands or scripts throughout their attack.Β 

T1059.003 Command and Scripting Interpreter: Windows Command ShellΒ 

Adversaries may abuse Windows Command Shell to execute commands or scripts throughout their attack.Β 

T1569.002 System Services: Service ExecutionΒ 

Adversaries may abuse Windows service control manager to execute commands or payloads during their attack.Β 

PersistenceΒ 

ExampleΒ 

T1053.005 Scheduled Task / Job: Scheduled TaskΒ 

Adversaries may abuse the Windows Task Scheduler to perform task scheduling for recurring execution of malware or malicious commands.Β 

T1574.002 Hijack Execution: DLL Side-LoadingΒ 

Adversaries may execute their own malicious code by side-loading DLL files into legitimate programs.Β Β 

Privilege EscalationΒ 

ExampleΒ 

T1548.002 Abuse Elevation Control Mechanism: Bypass User Account ControlΒ 

Adversaries may bypass UAC mechanisms to elevate their permissions on a system.Β 

Defense EvasionΒ 

ExampleΒ 

T1564.008 Hide Artifacts: Email Hiding RulesΒ 

Adversaries may create inbox rules to forward certain incoming emails to a folder to hide them from the inbox owner.Β 

T1070.004 Indicator Removal: File DeletionΒ 

Adversaries may delete files to cover their tracks during the attack.Β Β 

T1218.011 System Signed Binary Proxy Execution: Rundll32Β 

Adversaries may abuse the Windows utility rundll32.exe to execute malware.Β Β 

T1112 Modify RegistryΒ 

Adversaries may modify the registry to maintain persistence on a target system.Β Β 

T1562.010 Impair Defenses: Downgrade AttackΒ 

Adversaries may downgrade a program, such as PowerShell, to a version that is vulnerable to exploits.Β 

Credential AccessΒ 

ExampleΒ 

T1621 Multi-Factor Authentication Request GenerationΒ 

Adversaries may generate MFA push notifications causing an MFA exhaustion attack.Β 

T1003.005 OS Credential Dumping: NTDSΒ 

Adversaries may dump the contents of the NTDS.dit file to access credentials that can be used for lateral movement.Β 

T1003.001 OS Credential Dumping: LSASSΒ 

Adversaries may dump the contents of LSASS to access credentials that can be used for lateral movementΒ 

T1003.002 OS Credential Dumping: Service Account ManagerΒ 

Adversaries may dump the contents of the service account manager to access credentials that can be used for lateral movement.Β 

T1110.002 Brute Force: Password CrackingΒ 

Adversaries may use brute force account passwords to compromise accounts.Β 

DiscoveryΒ 

ExampleΒ 

T1069.001 Permission Groups Discovery: Local GroupsΒ 

Adversaries may attempt to discover local permissions groups with commands, such as β€œnet localgroup.”  

T1069.002 Permission Groups Discovery: Domain GroupsΒ 

Adversaries may attempt to discover domain groups with commands, such as β€œnet group /domain.” 

T1201 Password Policy DiscoveryΒ 

Adversaries may attempt to discover information about the password policy within a compromised network with commands, such as β€œnet accounts.” 

Lateral MovementΒ 

ExampleΒ 

T1021.001 Remote Services: Remote Desktop ProtocolΒ 

Adversaries may abuse valid accounts using RDP to move laterally in a target environment.Β Β 

T1534 Internal SpearphishingΒ 

Adversaries may abuse a compromised email account to send internal spearphishing emails to move laterally.Β 

T1021.002 Remote Services: SMB / Windows Admin SharesΒ 

Adversaries may abuse valid accounts using SMB to move laterally in a target environment.Β 

T1021.004 Remote Services: SSHΒ 

Adversaries may abuse valid accounts using SSH to move laterally in a target environment.Β 

T1021.001 Remote Services: Windows Remote ManagementΒ 

Adversaries may abuse valid accounts using WinRM to move laterally in a target environment.Β 

CollectionΒ 

ExampleΒ 

T1114.002 Email Collection: Remote Email CollectionΒ 

Adversaries may target a Microsoft Exchange server to collect information.Β Β 

T1074.001 Data Staged: Local Data StagingΒ 

Adversaries may stage collected data in preparation for exfiltration.Β 

T1074 Data StagedΒ 

Adversaries may stage collected data in preparation for exfiltration.Β 

Command and ControlΒ 

ExampleΒ 

T1105 Ingress Tool TransferΒ 

Adversaries may transfer tools from an external system to a compromised system.Β 

T1219 Remote Access SoftwareΒ Β 

Adversaries may abuse remote access software, such as AnyDesk, to establish an interactive C2 channel during their attack.Β Β 

ExfiltrationΒ 

ExampleΒ 

T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud StorageΒ 

Adversaries may exfiltrate data to a cloud storage provider, such as Dropbox.Β Β 

ImpactΒ 

ExampleΒ 

T1486 Data Encrypted for ImpactΒ 

Adversaries may use ransomware to encrypt data on a target system.Β Β 

T1490 Inhibit System RecoveryΒ 

Adversaries may disable system recovery features, such as volume shadow copies.Β Β 

T1657 Financial TheftΒ 

Adversaries may commit financial fraud during the attack.Β 

❌
❌