id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
202 | Additionally, the attacks targeted two banking institutions, PrivatBank and Oschadbank. | [
{
"id": 45896,
"label": "identity",
"start_offset": 61,
"end_offset": 71
},
{
"id": 45897,
"label": "identity",
"start_offset": 76,
"end_offset": 86
}
] | [] | [] |
203 | An initial investigation into the DDoS attacks suggested that Mirai and Meris bot networks may have been leveraged in the attacks. | [
{
"id": 45900,
"label": "malware",
"start_offset": 72,
"end_offset": 90
},
{
"id": 45898,
"label": "attack-pattern",
"start_offset": 34,
"end_offset": 46
},
{
"id": 45899,
"label": "malware",
"start_offset": 62,
"end_offset": 67
}
] | [] | [] |
204 | On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions. | [
{
"id": 44621,
"label": "identity",
"start_offset": 22,
"end_offset": 35
},
{
"id": 44622,
"label": "TIME",
"start_offset": 4,
"end_offset": 11
},
{
"id": 44623,
"label": "identity",
"start_offset": 44,
"end_offset": 58
},
{
"id": 44624,
"label": "attack-pattern",
"start_offset": 76,
"end_offset": 80
},
{
"id": 44625,
"label": "threat-actor",
"start_offset": 92,
"end_offset": 136
},
{
"id": 44626,
"label": "identity",
"start_offset": 159,
"end_offset": 166
},
{
"id": 44627,
"label": "attack-pattern",
"start_offset": 222,
"end_offset": 234
},
{
"id": 44628,
"label": "identity",
"start_offset": 249,
"end_offset": 286
}
] | [
{
"id": 4,
"from_id": 44624,
"to_id": 44625,
"type": "attributed-to"
},
{
"id": 131,
"from_id": 44627,
"to_id": 44628,
"type": "targets"
}
] | [] |
205 | However, at this time, attribution for the ongoing attacks has not been established. | [] | [] | [] |
206 | The Ukrainian CERT did identify a post on RaidForums from a user named “Carzita” that suggested that additional actors may also be launching DDoS and defacement attacks for undisclosed reasons. | [
{
"id": 45901,
"label": "identity",
"start_offset": 4,
"end_offset": 18
},
{
"id": 45903,
"label": "identity",
"start_offset": 72,
"end_offset": 79
},
{
"id": 45902,
"label": "identity",
"start_offset": 42,
"end_offset": 52
},
{
"id": 45904,
"label": "attack-pattern",
"start_offset": 141,
"end_offset": 145
},
{
"id": 45905,
"label": "attack-pattern",
"start_offset": 150,
"end_offset": 168
}
] | [] | [] |
207 | On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine. | [
{
"id": 678,
"label": "SHA2",
"start_offset": 58,
"end_offset": 122
},
{
"id": 44630,
"label": "location",
"start_offset": 192,
"end_offset": 205
},
{
"id": 44631,
"label": "FILEPATH",
"start_offset": 35,
"end_offset": 48
},
{
"id": 44632,
"label": "TIME",
"start_offset": 3,
"end_offset": 10
}
] | [
{
"id": 133,
"from_id": 678,
"to_id": 44631,
"type": "indicates"
}
] | [] |
208 | This executable is a signed file with a valid signature from an organization named Hermetica Digital Ltd. This signing certificate has since been explicitly revoked by its issuer. | [
{
"id": 45906,
"label": "identity",
"start_offset": 83,
"end_offset": 104
}
] | [] | [] |
209 | Upon execution, this file enumerates all files on a hard drive, wipes the partition info and then forces a system reboot, which predictably results in the following screen: | [] | [] | [] |
210 | Further analysis has confirmed that the malware accepts command-line arguments allowing an attacker to instruct the malware to sleep for a period of time or to shut down the system. | [] | [] | [] |
211 | Additionally the kernel module responsible for the actual wiping activity is from a legitimate application called EaseUS Partition Master. | [
{
"id": 45907,
"label": "tools",
"start_offset": 115,
"end_offset": 138
}
] | [] | [] |
212 | This software is designed as free partition software that can reorganize disk space for better performance. | [] | [] | [] |
213 | In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government. | [
{
"id": 44633,
"label": "location",
"start_offset": 114,
"end_offset": 121
},
{
"id": 44634,
"label": "identity",
"start_offset": 202,
"end_offset": 222
},
{
"id": 44635,
"label": "identity",
"start_offset": 90,
"end_offset": 110
},
{
"id": 44636,
"label": "location",
"start_offset": 152,
"end_offset": 158
},
{
"id": 44637,
"label": "location",
"start_offset": 163,
"end_offset": 172
},
{
"id": 44638,
"label": "malware",
"start_offset": 53,
"end_offset": 60
},
{
"id": 44639,
"label": "identity",
"start_offset": 133,
"end_offset": 172
}
] | [
{
"id": 6,
"from_id": 44638,
"to_id": 44635,
"type": "targets"
},
{
"id": 7,
"from_id": 44638,
"to_id": 44639,
"type": "targets"
}
] | [] |
214 | Additionally, ESET researchers have warned that they found this malware installed across “hundreds of machines” in Ukraine. | [
{
"id": 45908,
"label": "identity",
"start_offset": 14,
"end_offset": 18
},
{
"id": 45909,
"label": "location",
"start_offset": 115,
"end_offset": 122
}
] | [] | [] |
215 | Concurrent with the discovery of wiper malware, we also witnessed a second round of website defacements on Feb. 23. | [
{
"id": 45910,
"label": "TIME",
"start_offset": 108,
"end_offset": 115
},
{
"id": 45911,
"label": "attack-pattern",
"start_offset": 85,
"end_offset": 104
}
] | [] | [] |
216 | These attacks appear to have copied the messaging template observed in attacks exploiting the OctoberCMS vulnerability a month earlier on Jan.14, while adding a .onion web address and a message in red font that translates to, “Do you need proof, see the link at the end.” | [
{
"id": 44640,
"label": "vulnerability",
"start_offset": 94,
"end_offset": 118
},
{
"id": 44641,
"label": "TIME",
"start_offset": 138,
"end_offset": 144
}
] | [] | [] |
217 | The .onion site links to an entity calling themselves “Free Civilian” and offering to sell databases containing the personal data of Ukrainian citizens. | [] | [] | [] |
218 | Over the past 24 hours, the list of entities on the leaks section has expanded to 48 gov.ua domains and one Ukranian company (motorsich[.]com) that builds engines for airplanes and helicopters. | [
{
"id": 45912,
"label": "TIME",
"start_offset": 5,
"end_offset": 22
},
{
"id": 45913,
"label": "identity",
"start_offset": 108,
"end_offset": 124
},
{
"id": 45914,
"label": "DOMAIN",
"start_offset": 126,
"end_offset": 141
}
] | [] | [] |
219 | Our team analyzed the larger trends regarding Ukraine-related phishing and scam URLs detected by Advanced URL Filtering. | [
{
"id": 715,
"label": "attack-pattern",
"start_offset": 63,
"end_offset": 71
},
{
"id": 44643,
"label": "attack-pattern",
"start_offset": 76,
"end_offset": 85
}
] | [] | [] |
220 | We noticed an overall increase in the detection of websites that host phishing and scam URLs on domains using Ukraine-related TLDs such as gov.ua and com.ua, or containing popular Ukraine-related keywords such as "ukraine" and "ukrainian". | [
{
"id": 45915,
"label": "attack-pattern",
"start_offset": 70,
"end_offset": 78
},
{
"id": 45918,
"label": "location",
"start_offset": 214,
"end_offset": 221
},
{
"id": 45919,
"label": "location",
"start_offset": 110,
"end_offset": 117
}
] | [] | [] |
221 | This trend correlates with an increase in Google searches for terms like "Ukraine aid." | [
{
"id": 45916,
"label": "SOFTWARE",
"start_offset": 42,
"end_offset": 48
}
] | [] | [] |
223 | From January to late February, it appears that the number of Ukraine-related phishing and scam sites largely followed a similar trend as Ukraine-related internet searches; however, the number of phishing and scam sites has continued to rise through mid-late March as the situation remains ongoing. | [
{
"id": 737,
"label": "attack-pattern",
"start_offset": 78,
"end_offset": 86
},
{
"id": 741,
"label": "attack-pattern",
"start_offset": 196,
"end_offset": 204
},
{
"id": 45920,
"label": "TIME",
"start_offset": 6,
"end_offset": 13
},
{
"id": 45925,
"label": "attack-pattern",
"start_offset": 209,
"end_offset": 219
},
{
"id": 45921,
"label": "TIME",
"start_offset": 17,
"end_offset": 30
},
{
"id": 45922,
"label": "location",
"start_offset": 62,
"end_offset": 69
},
{
"id": 45923,
"label": "location",
"start_offset": 138,
"end_offset": 145
}
] | [] | [] |
224 | Figure 8 shows that the number of Ukraine-related phishing/scam sites is currently continuing to rise about a month after the “Ukraine aid” search term started trending in Google search. | [
{
"id": 747,
"label": "attack-pattern",
"start_offset": 50,
"end_offset": 58
},
{
"id": 45924,
"label": "attack-pattern",
"start_offset": 59,
"end_offset": 69
},
{
"id": 45926,
"label": "location",
"start_offset": 34,
"end_offset": 41
},
{
"id": 45927,
"label": "SOFTWARE",
"start_offset": 172,
"end_offset": 178
}
] | [] | [] |
225 | Among these phishing and scam URLs, we found a targeted phishing attack. | [
{
"id": 751,
"label": "attack-pattern",
"start_offset": 14,
"end_offset": 22
},
{
"id": 44645,
"label": "attack-pattern",
"start_offset": 27,
"end_offset": 36
},
{
"id": 44646,
"label": "attack-pattern",
"start_offset": 49,
"end_offset": 73
}
] | [] | [] |
226 | On March 16 while ingesting a third-party data feed, our in-house machine learning models detected a phishing webpage targeting a Ukrainian state administration employee. | [
{
"id": 756,
"label": "attack-pattern",
"start_offset": 101,
"end_offset": 109
},
{
"id": 45928,
"label": "TIME",
"start_offset": 3,
"end_offset": 11
},
{
"id": 45929,
"label": "identity",
"start_offset": 130,
"end_offset": 169
}
] | [
{
"id": 134,
"from_id": 756,
"to_id": 45929,
"type": "targets"
}
] | [] |
227 | The webpage is imitating a popular cloud file storage site. | [] | [] | [] |
228 | Upon visiting the webpage, the “Username” field is pre- | [] | [] | [] |
229 | populated with the targeted employee’s email address, and the user is then prompted to enter in their password in order to view a sensitive document as shown in Figure 9. | [] | [] | [] |
230 | Figure 9. hxxps://startrackzm[.]com/wap-admin/ONE-DRIVE/one%20d%20%20no%[email protected]. | [
{
"id": 45930,
"label": "URL",
"start_offset": 11,
"end_offset": 114
}
] | [] | [] |
231 | A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally. | [
{
"id": 765,
"label": "attack-pattern",
"start_offset": 2,
"end_offset": 10
},
{
"id": 771,
"label": "attack-pattern",
"start_offset": 193,
"end_offset": 201
},
{
"id": 44647,
"label": "identity",
"start_offset": 31,
"end_offset": 70
},
{
"id": 44648,
"label": "TIME",
"start_offset": 124,
"end_offset": 132
},
{
"id": 44649,
"label": "identity",
"start_offset": 146,
"end_offset": 164
},
{
"id": 44650,
"label": "location",
"start_offset": 315,
"end_offset": 322
}
] | [
{
"id": 135,
"from_id": 765,
"to_id": 44647,
"type": "targets"
},
{
"id": 136,
"from_id": 771,
"to_id": 44650,
"type": "targets"
}
] | [] |
232 | We are also sharing a list of IoCs that were detected as phishing and scam URLs. | [
{
"id": 45931,
"label": "attack-pattern",
"start_offset": 57,
"end_offset": 65
},
{
"id": 45932,
"label": "attack-pattern",
"start_offset": 70,
"end_offset": 79
}
] | [] | [] |
233 | Palo Alto Networks customers who subscribe to Advanced URL Filtering are already protected from these IoCs. | [
{
"id": 45933,
"label": "identity",
"start_offset": 0,
"end_offset": 18
}
] | [] | [] |
234 | We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting. | [
{
"id": 45781,
"label": "location",
"start_offset": 125,
"end_offset": 132
},
{
"id": 45934,
"label": "location",
"start_offset": 38,
"end_offset": 45
},
{
"id": 44651,
"label": "attack-pattern",
"start_offset": 158,
"end_offset": 172
}
] | [
{
"id": 137,
"from_id": 44651,
"to_id": 45781,
"type": "targets"
}
] | [] |
235 | We detected 11,637 cybersquatting newly registered domains (NRDs) during February and March. | [
{
"id": 45935,
"label": "TIME",
"start_offset": 73,
"end_offset": 81
},
{
"id": 45936,
"label": "TIME",
"start_offset": 86,
"end_offset": 91
}
] | [] | [] |
236 | In particular, we noticed a sharp increase in the number of cybersquatting domains that were registered close to Feb. 24, as shown in Figure 10 below. | [
{
"id": 45937,
"label": "attack-pattern",
"start_offset": 60,
"end_offset": 74
},
{
"id": 45938,
"label": "TIME",
"start_offset": 113,
"end_offset": 120
}
] | [] | [] |
237 | We manually analyzed a sample set of these cybersquatting domains. | [
{
"id": 45782,
"label": "attack-pattern",
"start_offset": 44,
"end_offset": 58
}
] | [] | [] |
238 | Below we share some interesting case studies. | [] | [] | [] |
240 | A detailed analysis of these domains revealed that many of them are fake. | [] | [] | [] |
241 | These donation websites provide little to no information about the associated organization and distribution of funds. | [] | [] | [] |
242 | Many of these websites use cryptocurrency wallets (e.g., BTC, ETH) to accept payment (likely because these wallets are easy to set up and require no verification). We also find that some websites are mimicking popular donation websites or organizations to trick users into paying them money. | [
{
"id": 45940,
"label": "SOFTWARE",
"start_offset": 57,
"end_offset": 60
},
{
"id": 45941,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 65
}
] | [] | [] |
243 | We show some examples in Figure 11. | [] | [] | [] |
244 | For instance, donatetoukraine[.]com is pretending to be associated with the popular Come Back Alive campaign. | [
{
"id": 45942,
"label": "DOMAIN",
"start_offset": 14,
"end_offset": 35
},
{
"id": 45943,
"label": "campaign",
"start_offset": 84,
"end_offset": 108
}
] | [
{
"id": 138,
"from_id": 45942,
"to_id": 45943,
"type": "related-to"
}
] | [] |
245 | While the banking information shared on the donation website matches the original campaign website, we confirmed that the BTC wallet address is different from the actual. | [
{
"id": 45944,
"label": "SOFTWARE",
"start_offset": 122,
"end_offset": 132
}
] | [] | [] |
246 | We found a cybersquatting domain – save-russia[.]today – that is launching DoS attacks on Ukrainian news sites. | [
{
"id": 44652,
"label": "attack-pattern",
"start_offset": 13,
"end_offset": 27
},
{
"id": 44653,
"label": "DOMAIN",
"start_offset": 37,
"end_offset": 56
},
{
"id": 44654,
"label": "attack-pattern",
"start_offset": 77,
"end_offset": 88
},
{
"id": 44655,
"label": "identity",
"start_offset": 92,
"end_offset": 112
}
] | [
{
"id": 8,
"from_id": 44653,
"to_id": 44655,
"type": "targets"
},
{
"id": 112,
"from_id": 44652,
"to_id": 44653,
"type": "uses"
},
{
"id": 113,
"from_id": 44654,
"to_id": 44653,
"type": "uses"
}
] | [] |
247 | Once a user opens the website in the browser, it starts making requests to various Ukrainian news sites and lists the number of requests made to each new site on the home page, as shown in Figure 12 below. | [
{
"id": 45945,
"label": "identity",
"start_offset": 83,
"end_offset": 103
}
] | [] | [] |
248 | Figure 12. | [] | [] | [] |
249 | A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites. | [
{
"id": 44656,
"label": "attack-pattern",
"start_offset": 2,
"end_offset": 16
},
{
"id": 44657,
"label": "DOMAIN",
"start_offset": 24,
"end_offset": 43
},
{
"id": 44658,
"label": "attack-pattern",
"start_offset": 57,
"end_offset": 68
},
{
"id": 44659,
"label": "identity",
"start_offset": 72,
"end_offset": 92
}
] | [
{
"id": 9,
"from_id": 44658,
"to_id": 44659,
"type": "targets"
},
{
"id": 114,
"from_id": 44656,
"to_id": 44657,
"type": "uses"
},
{
"id": 115,
"from_id": 44658,
"to_id": 44657,
"type": "uses"
}
] | [] |
250 | We strongly recommend that users be alert to the possibility of cybersquatting domains. | [
{
"id": 45946,
"label": "attack-pattern",
"start_offset": 64,
"end_offset": 78
}
] | [] | [] |
251 | In particular, fake donation websites mimicking popular websites can be misleading, as described earlier. | [
{
"id": 45948,
"label": "attack-pattern",
"start_offset": 38,
"end_offset": 64
},
{
"id": 45947,
"label": "attack-pattern",
"start_offset": 15,
"end_offset": 37
}
] | [] | [] |
252 | Before donating money, we recommend checking whether the website is referenced and shared by the official charity or government organization. | [] | [] | [] |
253 | Our teams at Palo Alto Networks will continue monitoring domain squatting attacks and work to protect customers against them. | [
{
"id": 45949,
"label": "identity",
"start_offset": 13,
"end_offset": 31
},
{
"id": 45950,
"label": "attack-pattern",
"start_offset": 57,
"end_offset": 81
}
] | [] | [] |
255 | We detected campaigns of fake downloads where threat actors have set up web pages to host malicious binaries. | [
{
"id": 44660,
"label": "attack-pattern",
"start_offset": 26,
"end_offset": 40
},
{
"id": 44661,
"label": "attack-pattern",
"start_offset": 86,
"end_offset": 109
}
] | [] | [] |
257 | Most of these web pages show malicious binaries as popular browsers or communication apps in order to deceive users. | [] | [] | [] |
258 | For example, we detected a website that was distributing a malicious binary by masquerading as a popular global communication app targeting users in Ukraine. | [
{
"id": 847,
"label": "attack-pattern",
"start_offset": 79,
"end_offset": 91
},
{
"id": 44662,
"label": "location",
"start_offset": 149,
"end_offset": 156
},
{
"id": 44663,
"label": "attack-pattern",
"start_offset": 44,
"end_offset": 75
}
] | [] | [] |
260 | Note that Palo Alto Networks customers receive protections against such domains from the Next-Generation Firewall via Advanced URL Filtering, DNS Security and WildFire URL Analysis subscriptions. | [
{
"id": 45955,
"label": "SOFTWARE",
"start_offset": 159,
"end_offset": 167
},
{
"id": 45954,
"label": "identity",
"start_offset": 10,
"end_offset": 28
}
] | [] | [] |
261 | We also found that these fake download campaigns rotate domains to distribute the same malicious binaries. | [
{
"id": 44664,
"label": "attack-pattern",
"start_offset": 25,
"end_offset": 38
},
{
"id": 44665,
"label": "attack-pattern",
"start_offset": 87,
"end_offset": 105
}
] | [] | [] |
262 | For example, we detected two domains distributing the same malicious binary where one domain was impersonating a popular, widely used video conferencing application and the other a widely used internet browser. | [] | [] | [] |
264 | Our teams at Palo Alto Networks will continue to monitor and work to protect our customers against such attacks. | [
{
"id": 44666,
"label": "identity",
"start_offset": 13,
"end_offset": 31
}
] | [] | [] |
267 | Consistent with our previous reporting on the situation, Unit 42 continues to lead a company-wide effort to collect, evaluate and disseminate the latest intelligence on cyber activity related to Russia and Ukraine. | [
{
"id": 45785,
"label": "identity",
"start_offset": 58,
"end_offset": 65
},
{
"id": 45783,
"label": "location",
"start_offset": 196,
"end_offset": 202
},
{
"id": 45784,
"label": "location",
"start_offset": 207,
"end_offset": 214
}
] | [] | [] |
268 | We are actively collaborating with our partners in industry and governments to share our analysis and findings based on our global threat telemetry network. | [] | [] | [] |
269 | These efforts have enabled us to make near-daily updates to our platform to ensure our customers have the best protection possible. | [] | [] | [] |
270 | This includes blocking hundreds of domain names, IP addresses and URLs for our customers related to newly discovered attacks. | [] | [] | [] |
271 | We’ve updated and added signatures to the WildFire analysis and Cortex XDR Prevent and Pro products to block newly discovered vulnerabilities and malware including HermeticWiper. | [
{
"id": 45961,
"label": "SOFTWARE",
"start_offset": 42,
"end_offset": 50
},
{
"id": 45960,
"label": "malware",
"start_offset": 164,
"end_offset": 177
},
{
"id": 45962,
"label": "SOFTWARE",
"start_offset": 64,
"end_offset": 90
}
] | [] | [] |
272 | Read more about Cortex XDR protections. | [
{
"id": 45963,
"label": "SOFTWARE",
"start_offset": 16,
"end_offset": 26
}
] | [] | [] |
273 | Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat. | [
{
"id": 906,
"label": "malware",
"start_offset": 133,
"end_offset": 144
},
{
"id": 44671,
"label": "campaign",
"start_offset": 133,
"end_offset": 152
},
{
"id": 44672,
"label": "SOFTWARE",
"start_offset": 173,
"end_offset": 178
},
{
"id": 44670,
"label": "vulnerability",
"start_offset": 91,
"end_offset": 115
}
] | [
{
"id": 10,
"from_id": 44671,
"to_id": 44670,
"type": "delivers"
}
] | [] |
274 | Cortex Xpanse can assist with understanding and managing your organization’s attack surface as well as identifying vulnerable resources. | [
{
"id": 45964,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 13
}
] | [] | [] |
275 | We have released public reports on the WhisperGate attacks and the infrastructure and tactics used by the Gamaredon group. | [
{
"id": 45965,
"label": "malware",
"start_offset": 40,
"end_offset": 51
},
{
"id": 45966,
"label": "threat-actor",
"start_offset": 107,
"end_offset": 122
}
] | [] | [] |
276 | On the Unit 42 website, you will also find a free ATOM which contains a structured mapping of the Gamaredon group’s tactics aligned to MITRE’s ATT&CK framework. | [
{
"id": 44673,
"label": "identity",
"start_offset": 7,
"end_offset": 14
},
{
"id": 44674,
"label": "threat-actor",
"start_offset": 98,
"end_offset": 107
},
{
"id": 44675,
"label": "SOFTWARE",
"start_offset": 135,
"end_offset": 159
},
{
"id": 44676,
"label": "SOFTWARE",
"start_offset": 50,
"end_offset": 54
}
] | [] | [] |
277 | As the situation continues to develop, we’ll continue to update our blog with the latest information. | [] | [] | [] |
278 | There is no single action you can take to protect your organization against this threat. | [] | [] | [] |
279 | Unlike a new malware family or vulnerability in the wild, the attacks we expect could come in many forms. | [] | [] | [] |
280 | Several western governments have proposed broad recommendations focused on technical hygiene. | [
{
"id": 45967,
"label": "identity",
"start_offset": 8,
"end_offset": 27
}
] | [] | [] |
281 | We consider these appropriate given the variety of tactics that Russian actors have used in the past. | [
{
"id": 45968,
"label": "identity",
"start_offset": 64,
"end_offset": 78
}
] | [] | [] |
282 | We recommend organizations prioritize actions in the following four areas: There is no way to know for certain what shape an attack may take, but taking these steps will help provide broad protection against what we expect to come. | [] | [] | [] |
283 | Unit 42, the threat intelligence and security consulting arm of Palo Alto Networks, has a team of experts who can help your organization assess and test your security controls with proactive assessments and incident simulation services. | [
{
"id": 45970,
"label": "identity",
"start_offset": 1,
"end_offset": 8
},
{
"id": 45971,
"label": "identity",
"start_offset": 65,
"end_offset": 83
}
] | [] | [] |
284 | Because of the likelihood of ransomware attacks – or destructive attacks that pose as ransomware – it may be beneficial to focus on preparing in this area, particularly ensuring backup and recovery plans are in place. | [] | [] | [] |
285 | We have distilled the knowledge we’ve gained from responding to hundreds of ransomware incidents into our Ransomware Readiness Assessment offering, which is designed to help organizations strengthen their processes and technology to mitigate threats like the ones we expect in the coming days and weeks. | [] | [] | [] |
286 | If you think you may have been compromised by wiper attacks, Gamaredon, DDoS attacks or other cyber activity related to Russia-Ukraine, or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200. | [
{
"id": 45972,
"label": "threat-actor",
"start_offset": 62,
"end_offset": 71
},
{
"id": 45975,
"label": "location",
"start_offset": 325,
"end_offset": 330
},
{
"id": 45976,
"label": "location",
"start_offset": 301,
"end_offset": 305
},
{
"id": 45979,
"label": "identity",
"start_offset": 185,
"end_offset": 215
},
{
"id": 45973,
"label": "attack-pattern",
"start_offset": 73,
"end_offset": 85
},
{
"id": 45974,
"label": "location",
"start_offset": 224,
"end_offset": 237
},
{
"id": 45977,
"label": "location",
"start_offset": 278,
"end_offset": 282
},
{
"id": 45980,
"label": "attack-pattern",
"start_offset": 47,
"end_offset": 60
}
] | [] | [] |
287 | Threat Brief: Ongoing Russia and Ukraine Cyber Conflict (Jan. 20) Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine (Updated Feb. 16) | [
{
"id": 965,
"label": "threat-actor",
"start_offset": 76,
"end_offset": 85
},
{
"id": 966,
"label": "threat-actor",
"start_offset": 90,
"end_offset": 104
},
{
"id": 51805,
"label": "TIME",
"start_offset": 58,
"end_offset": 65
},
{
"id": 51806,
"label": "TIME",
"start_offset": 151,
"end_offset": 158
},
{
"id": 45982,
"label": "location",
"start_offset": 23,
"end_offset": 29
},
{
"id": 45983,
"label": "location",
"start_offset": 34,
"end_offset": 41
},
{
"id": 45981,
"label": "location",
"start_offset": 67,
"end_offset": 74
}
] | [
{
"id": 139,
"from_id": 965,
"to_id": 966,
"type": "duplicate-of"
},
{
"id": 141,
"from_id": 966,
"to_id": 45981,
"type": "originates-from"
},
{
"id": 140,
"from_id": 965,
"to_id": 45981,
"type": "originates-from"
}
] | [] |
288 | Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity | [
{
"id": 970,
"label": "attack-pattern",
"start_offset": 0,
"end_offset": 14
},
{
"id": 974,
"label": "malware",
"start_offset": 94,
"end_offset": 102
},
{
"id": 976,
"label": "malware",
"start_offset": 122,
"end_offset": 130
},
{
"id": 977,
"label": "location",
"start_offset": 167,
"end_offset": 173
},
{
"id": 978,
"label": "location",
"start_offset": 174,
"end_offset": 181
},
{
"id": 979,
"label": "identity",
"start_offset": 197,
"end_offset": 215
},
{
"id": 981,
"label": "location",
"start_offset": 247,
"end_offset": 253
},
{
"id": 982,
"label": "location",
"start_offset": 254,
"end_offset": 261
},
{
"id": 983,
"label": "tools",
"start_offset": 277,
"end_offset": 287
},
{
"id": 44679,
"label": "identity",
"start_offset": 30,
"end_offset": 54
},
{
"id": 44678,
"label": "location",
"start_offset": 47,
"end_offset": 54
},
{
"id": 44685,
"label": "location",
"start_offset": 332,
"end_offset": 339
},
{
"id": 44686,
"label": "location",
"start_offset": 344,
"end_offset": 350
}
] | [
{
"id": 116,
"from_id": 970,
"to_id": 44679,
"type": "targets"
},
{
"id": 118,
"from_id": 974,
"to_id": 970,
"type": "uses"
},
{
"id": 119,
"from_id": 976,
"to_id": 970,
"type": "uses"
},
{
"id": 117,
"from_id": 974,
"to_id": 44679,
"type": "targets"
}
] | [] |
289 | CISA: Shields Up Technical Guidance 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591 0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da a64c3e0522fad787b95bfb6a30c3aed1b5786e69e88e023c062ec7e5cebf4d3e 3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767 2c10b2ec0b995b88c27d141d6f7b14d6b8177c52818687e4ff8e6ecf53adf5bf 06086c1da4590dcc7f1e10a6be3431e1166286a9e7761f2de9de79d7fda9c397 Name | [
{
"id": 988,
"label": "SHA2",
"start_offset": 37,
"end_offset": 101
},
{
"id": 989,
"label": "SHA2",
"start_offset": 102,
"end_offset": 166
},
{
"id": 990,
"label": "SHA2",
"start_offset": 167,
"end_offset": 231
},
{
"id": 992,
"label": "SHA2",
"start_offset": 297,
"end_offset": 361
},
{
"id": 991,
"label": "SHA2",
"start_offset": 232,
"end_offset": 296
},
{
"id": 993,
"label": "SHA2",
"start_offset": 362,
"end_offset": 426
},
{
"id": 45984,
"label": "identity",
"start_offset": 0,
"end_offset": 4
}
] | [] | [] |
290 | Hermetica Digital Ltd Thumbprint 1AE7556DFACD47D9EFBE79BE974661A5A6D6D923 Serial Number 0C 48 73 28 73 AC 8C CE BA F8 F0 E1 E8 32 9C EC | [
{
"id": 45985,
"label": "identity",
"start_offset": 0,
"end_offset": 21
}
] | [] | [] |
291 | gcbejm2rcjftouqbxuhimj5oroouqcuxb2my4raxqa7efkz5bd5464id[.]onion | [
{
"id": 44687,
"label": "DOMAIN",
"start_offset": 1,
"end_offset": 65
}
] | [] | [] |
292 | Please see the IoCs on GitHub. | [
{
"id": 45987,
"label": "SOFTWARE",
"start_offset": 24,
"end_offset": 30
}
] | [] | [] |
293 | In Alert AA22-011A (updated March 1, 2022), the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS/CISA) identifies a selection of vulnerabilities that Russian advanced persistent threat (APT) groups are assessed to have exploited in the past, but recommends that users take action against a much broader list of known exploited vulnerabilities (KEVs). | [
{
"id": 45992,
"label": "identity",
"start_offset": 141,
"end_offset": 145
},
{
"id": 45989,
"label": "identity",
"start_offset": 48,
"end_offset": 84
},
{
"id": 45990,
"label": "identity",
"start_offset": 87,
"end_offset": 135
},
{
"id": 45991,
"label": "identity",
"start_offset": 137,
"end_offset": 140
},
{
"id": 45993,
"label": "location",
"start_offset": 194,
"end_offset": 201
}
] | [] | [] |
294 | The cited KEVs and their impacted devices – all of which can be identified using Cortex Xpanse – are: Cortex Xpanse’s ability to index the entire internet helps organizations discover, prioritize, and remediate significant exposures on their attack surfaces – including all of the impacted services listed above. | [
{
"id": 44688,
"label": "SOFTWARE",
"start_offset": 81,
"end_offset": 94
},
{
"id": 44689,
"label": "SOFTWARE",
"start_offset": 104,
"end_offset": 117
}
] | [] | [] |
295 | We routinely observe vulnerable devices across the global internet, despite the fact that most of these CVEs are more than two years old. | [] | [] | [] |
296 | Beyond Alert AA22-011A, CISA’s overarching guidance for attack surface reduction includes hardening of forward-facing network services, with prioritized patching of KEVs, as documented in Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities (KEV). | [
{
"id": 45994,
"label": "identity",
"start_offset": 24,
"end_offset": 28
}
] | [] | [] |
297 | This directive requires agencies to remediate all vulnerabilities that CISA includes in their KEV catalog based on an assessment that the vulnerabilities “carry significant risk to the federal enterprise.” | [
{
"id": 45995,
"label": "identity",
"start_offset": 71,
"end_offset": 75
}
] | [] | [] |
298 | Learn more and see a detailed workflow example on the Palo Alto Networks SecOps blog, “How Xpanse Can Identify CISA-Identified Known Exploited Vulnerabilities.” | [
{
"id": 45998,
"label": "identity",
"start_offset": 111,
"end_offset": 115
},
{
"id": 45996,
"label": "identity",
"start_offset": 54,
"end_offset": 72
},
{
"id": 45997,
"label": "SOFTWARE",
"start_offset": 91,
"end_offset": 97
}
] | [] | [] |
299 | Updated April 1, 2022, at 11 a.m. PT. | [
{
"id": 45999,
"label": "TIME",
"start_offset": 8,
"end_offset": 37
}
] | [] | [] |
300 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
301 | Please mark, I'm not a robot! | [] | [] | [] |
302 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
303 | Recent events continue to highlight the abuse of remote access applications in the enterprise. | [] | [] | [] |
304 | Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP). | [
{
"id": 1035,
"label": "malware",
"start_offset": 54,
"end_offset": 61
},
{
"id": 46000,
"label": "tools",
"start_offset": 88,
"end_offset": 91
},
{
"id": 46001,
"label": "tools",
"start_offset": 216,
"end_offset": 256
},
{
"id": 46002,
"label": "identity",
"start_offset": 14,
"end_offset": 22
},
{
"id": 46003,
"label": "TIME",
"start_offset": 0,
"end_offset": 12
}
] | [
{
"id": 142,
"from_id": 1035,
"to_id": 46000,
"type": "uses"
},
{
"id": 143,
"from_id": 1035,
"to_id": 46001,
"type": "uses"
}
] | [] |
305 | This allows the attacker to maintain control over the system even after the Citadel infection is removed. | [
{
"id": 46004,
"label": "malware",
"start_offset": 76,
"end_offset": 83
}
] | [] | [] |
306 | As the report indicates, using RDP this way also allows the attackers to “fly under the radar” as RDP is commonly used by administrators and often not treated as a threat. | [
{
"id": 44690,
"label": "tools",
"start_offset": 98,
"end_offset": 101
},
{
"id": 44691,
"label": "tools",
"start_offset": 31,
"end_offset": 34
}
] | [] | [] |
307 | Later that same week, US-CERT released alert TA14-212A on the Backoff Point of Sale (PoS) malware, which describes how malicious actors used publicly available tools to identify organizations that use remote access applications in an unsafe way. | [
{
"id": 46005,
"label": "identity",
"start_offset": 23,
"end_offset": 30
},
{
"id": 46006,
"label": "malware",
"start_offset": 63,
"end_offset": 90
}
] | [] | [] |
308 | This reconnaissance was then leveraged in brute force attacks against credentials, toward unauthorized access, implant installation, and subsequent exfiltration of consumer payment data. | [
{
"id": 1059,
"label": "attack-pattern",
"start_offset": 42,
"end_offset": 53
},
{
"id": 46007,
"label": "attack-pattern",
"start_offset": 111,
"end_offset": 131
},
{
"id": 46009,
"label": "attack-pattern",
"start_offset": 148,
"end_offset": 185
},
{
"id": 46008,
"label": "attack-pattern",
"start_offset": 90,
"end_offset": 109
}
] | [] | [] |
309 | As with any tool, remote access applications can be used for good or malicious intent. | [] | [] | [] |