Account Credentials Theft in Domain Environments Detected by EDR

Account Credentials Theft in Domain Environments Detected by EDR

The “Internal Reconnaissance in Domain Environments Detected by EDR” [1] post covered cases where EDR was used to detect the process of a threat actor taking over a system in an Active Directory environment before conducting internal reconnaissance to collect information. If an organization’s infrastructure is an environment that uses

Internal Reconnaissance in Domain Environments Detected by EDR

Internal Reconnaissance in Domain Environments Detected by EDR

While threat actors can raise a profit by installing CoinMiners or ransomware after initial access, they often first install a backdoor or RAT malware to seize control over the infected system. Infostealers are used for the purpose of stealing user information in the system, but sometimes, they are used to

Trend Analysis on Kimsuky Group’s Attacks Using AppleSeed

Trend Analysis on Kimsuky Group’s Attacks Using AppleSeed

Known to be supported by North Korea, the Kimsuky threat group has been active since 2013. At first, they attacked North Korea-related research institutes in South Korea before attacking a South Korean energy corporation in 2014. Since 2017, attacks targeting countries other than South Korea have also been observed. [1] The

Analysis of Attacks That Install Scanners on Linux SSH Servers

Analysis of Attacks That Install Scanners on Linux SSH Servers

AhnLab Security Emergency response Center (ASEC) analyzes attack campaigns against poorly managed Linux SSH servers and shares the results on the ASEC Blog. Before installing malware such as DDoS bot and CoinMiner, the threat actors need to obtain information on the attack target, that is the IP address and SSH

Apache ActiveMQ Vulnerability (CVE-2023-46604) Continuously Being Exploited in Attacks

Apache ActiveMQ Vulnerability (CVE-2023-46604) Continuously Being Exploited in Attacks

In November 2023, AhnLab Security Emergency response Center (ASEC) published a blog post titled “Circumstances of the Andariel Group Exploiting an Apache ActiveMQ Vulnerability (CVE-2023-46604)” [1] which covered cases of the Andariel threat group exploiting the CVE-2023-46604 vulnerability to install malware. This post not only covered attack cases of the

2023 Oct – Threat Trend Report on APT Groups

2023 Oct – Threat Trend Report on APT Groups

In this report, we cover nation-led threat groups presumed to conduct cyber espionage or sabotage under the support of the governments of certain countries, referred to as “Advanced Persistent Threat (APT) groups” for the sake of convenience. Therefore, this report does not contain information on cybercriminal groups aiming to gain

2023 Oct – Deep Web and Dark Web Threat Trend Report

2023 Oct – Deep Web and Dark Web Threat Trend Report

This trend report on the deep web and dark web of October 2023 is sectioned into Ransomware, Forums & Black Markets, and Threat Actors. We would like to state beforehand that some of the content has yet to be confirmed to be true. Ransomware – Rebrand of Hive? Hunters International

2023 Oct – Threat Trend Report on Kimsuky Group

2023 Oct – Threat Trend Report on Kimsuky Group

The Kimsuky group’s activities in October 2023 decreased slightly in comparison to their overall activities in September. One phishing domain was discovered, but because it uses the BabyShark infrastructure, it was classified as the BabyShark type. There was also a compound type where FlowerPower and RandomQuery were distributed simultaneously. Finally,

2023 Oct – Threat Trend Report on Ransomware Statistics and Major Issues

2023 Oct – Threat Trend Report on Ransomware Statistics and Major Issues

This report provides statistics on the number of new ransomware samples, targeted systems, and targeted businesses in October 2023, as well as notable ransomware issues in Korea and other countries. Key Trends 1) HelloKitty Ransomware’s Source Code Leaked 2) Ransomware Attacks Against Unpatched WS_FTP Server 3) BlackCat Ransomware Uses ‘Munchkin’

Infected Systems Controlled Through Remote Administration Tools (Detected by EDR)

Infected Systems Controlled Through Remote Administration Tools (Detected by EDR)

Remote administration tools are software for managing and controlling terminals at remote locations. The tools can be used as work-at-home solutions in circumstances such as the COVID-19 pandemic and for the purpose of controlling, managing, and repairing unmanned devices remotely. Such remote control tools used for legitimate purposes are called