cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2208
Views
30
Helpful
1
Comments
psomol
Cisco Employee
Cisco Employee

We are excited to announce new additions to our growing list of Machine-Learning-powered Confirmed Threat detections provided by the Cognitive Intelligence engine. Thanks to the improvement made to our Machine Learning backend (see Machine Learning Backend Improved blog) we have added 22 net-new Confirmed Threat types (see list below) and increased detection rates for the previously existing Confirmed Threats in the past six months.

 

Newly Added Confirmed Threats

Confirmed Threat ID Name Category Risk Description
CLKB00 LokiBot malware information stealer Critical LokiBot is a commodity malware sold on underground sites which is designed to steal private data from infected machines and submit it to the command and control (C2) server via a HTTP request.
CORR01 Orcus RAT information stealer Critical A campaign that delivers the Orcus Remote Access Trojan embedded in video files and images. The trojan focuses on information stealing and .NET evasion. Capable of stealing browser cookies, passwords, manipulating webcam and microphone, even launching server stress tests (DDoS attacks).
CRAT07 Gh0st RAT information stealer Critical Gh0st RAT. Gh0st RAT gives the attacker complete remote control and administration of the infected device. Threat is capable of stealing information, executing commands, modifying registry keys, and grabbing screen captures of the infected host.
CRAT08 NanoCore RAT information stealer Critical NanoCore RAT. NanoCore RAT gives the attacker complete remote control and administration of the infected device. Threat is capable of stealing information, executing commands, modifying registry keys, and grabbing screen captures of the infected host.
CDRP05 Malspam/Vidar malware distribution High Malicious spam (malspam) using Microsoft Office documents. This campaign is distributing the new version of Vidar, a powerful information stealer.
CFEK01  Fallout EK exploit kit High Fallout exploit kit (EK) which exploits vulnerabilities in IE and Flash to infect the device with malware. The malware delivered by the EK varies, it usually spreads ransomware, lately focusing on GandCrab.
CKRS01 Coin miner cryptocurrency miner High Linux coin miner which installs cryptocurrency-mining malware onto the device. It targets systems with high computational power. It is capable to survive reboots and deletions.
CSHL01 OSX/Shlayer malware malware distribution High OSX/Shlayer variant, macOS malware. The Trojan horse infection is spread through a fake Flash Player installer. The initial infection leverages shell scripts to download additional malware or adware onto the infected system.
CGCB01 GrandCrab ransomware ransomware High GandCrab ransomware which steals user data to hold it hostage. Distribution methods include automated attacks using exploit kits such as Fallout EK, Emotet, and credential stealers like Vidar.
CTAL0001 Emotet banking trojan trojan High Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails. (Talos cluster)
CTAL0002 GrandCrab ransomware ransomware High GandCrab is ransomware that encrypts documents, photos, databases and other important files using the file extension ".GDCB", ".CRAB" or ".KRAB". (Talos cluster)
CTAL0003 Cerber ransomware ransomware High Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber". (Talos cluster)
CTAL0004 Eldorado Ircbot trojan High Ircbot, also known as Eldorado, is known for injecting into processes, spreading to removable media, and gaining execution via Autorun.inf files. (Talos cluster)
CTAL0005 Autoit malware family trojan High Autoit is a malware family leveraging the well-known AutoIT automation tool, widely used by system administrators. AutoIT exposes a rich scripting language that allows to write fully functional malicious software. (Talos cluster)
CTAL0006 Vobfus worm trojan High Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its C&C servers. (Talos cluster)
CTAL0007 Razy trojan trojan High Razy is oftentimes a generic detection name for a Windows trojan. They collect sensitive information from the infected host and encrypt the data, and send it to a command and control (C2) server. (Talos cluster)
CTPG02 Emotet banking trojan banking trojan High Emotet banking Trojan, also known as Geodo. Geodo is a modular botnet which may steal confidential information including financial data and credit card information, modify encrypted traffic, and send spam. (Talos cluster)
CZAC00 ZeroAccess rootkit click fraud High ZeroAccess outbound communication, a rootkit that relies on P2P for C2 communications. ZeroAccess is typically delivered through exploit kits hosted on compromised servers and used for click-fraud and/or bitcoin mining.
CADI53 Browser ad-injector ad injector Med Potentially unwanted applications (PUAs) that inject advertising into the user’s browser session that may lead to further malware infections.
CTSQ02 Typosquatting sites malicious content distribution Low Typosquatting campaigns that distribute malicious software through drive-by downloads. When users access these sites, such as 'twitter.om' instead of 'twitter.com,' they get redirected to malicious sites meant to lure the user into installing malicious software.
CPRL01 Browser ad-injector PUA Low Potentially unwanted applications (PUAs) that inject advertising into the user’s browser session which may lead to further malware infections.
CPHI06 Pied Piper phishing/RAT malware distribution Low Pied Piper phishing campaign. The infection vectors are Word documents containing macros that leverage the legitimate msiexec.exe binary from Microsoft to download and execute downloaders that deploy RATs (Remote Access Trojans) such as Ammyy RAT.

 

 

Sample finding of Emotet banking trojan (Confirmed Threat ID CTAL0001)Sample finding of Emotet banking trojan (Confirmed Threat ID CTAL0001)Sample finding of ZeroAccess rootkit (Confirmed Threat ID CZAC00)Sample finding of ZeroAccess rootkit (Confirmed Threat ID CZAC00)

 

Confirmed Threat Updates

Note that our newly introduced semi-automatic Indicator-of-Compromise (IoC) hunt processes (see Machine Learning Backend Improved blog) allowed us to increase the IoC coverage of existing Confirmed Threats. From November 2018 till May 2019 we added altogether 792 High risk IoCs, 446 Mid risk IoCs and 1886 Low risk IoCs, covering 49 different Confirmed Threat types. In particular, more than hundred IoCs have been added to each of the following Confirmed Threats: ngrBot (variant of Dorkbot, high risk), Necurs backdoor trojan (high risk), Pirrit and other forms of adware (mid risk), Adware InstallCore (mid risk), Typosquatting (low risk) and untrusted VPN services (low risk).

1 Comment
biju.balan1
Level 1
Level 1

What does this mean? Recently my security team raised a concern where they started seeing some malicious traffic from our cisco 4331 router. They named it "Nanocore C2/Hosting [Crime] [Nanocore]" . Reason why I landed up here in this page. Do we have any IOS releases those affected  by this. Can yous atrt including such things also in your blog. Things like "What does this mean to a customer'

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: