{"id":891,"date":"2024-06-05T05:40:05","date_gmt":"2024-06-05T05:40:05","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=891"},"modified":"2025-07-28T09:29:38","modified_gmt":"2025-07-28T09:29:38","slug":"1-pandemic-3-threat-groups-1-new-ransomware-and-a-vulnerability-what-do-you-get-a-recipe-for-a-great-hack","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/1-pandemic-3-threat-groups-1-new-ransomware-and-a-vulnerability-what-do-you-get-a-recipe-for-a-great-hack\/","title":{"rendered":"1 Pandemic, 3 Threat Groups, 1 New Ransomware And A Vulnerability, What Do You Get? A Recipe For A Great Hack!"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/06\/three-attack-groups.webp\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p><strong>Introduction:<\/strong><\/p>\n\n\n\n<p>As the world plunges into the pandemic chaos, cyber attackers show little or no remorse on attacking enterprises, hospitals, and critical infrastructures using sophisticated techniques.&nbsp;<a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-099a\" target=\"_blank\" rel=\"noopener\"><strong>FBI<\/strong><\/a>&nbsp;has warned against the rise of cyber attacks across the globe taking advantage of the crisis. One such sophisticated technique is to exploit the vendors product vulnerability in the Client environment to leverage and expand the Attack Surface.<\/p>\n\n\n\n<p>As the attackers try to maximise their ultimate gain from such access, with this specific threat group that we analyse in this report, they use Ransomware as their final payload to bring their target to its knees and force them to pay. These attackers with a ransomware based campaign are targeting organizations that have public facing IT administration applications running and can use these to plant ransomware on the entire network.&nbsp;<\/p>\n\n\n\n<p>During the first week of April 2020, the LMNTRIX Cyber Defence Center (CDC) identified a new Ransomware attack in progress at one of our clients \u2013 a US based construction company. The client is an enterprise with all the usual security controls including NextGen Firewalls, Web and Email security together with two different types of NextGen AV, one running on their endpoints and the other on their servers and cloud infrastructure. All were completely bypassed by this attack as the ransomware took hold and started to encrypt both workstations and servers. &nbsp;<\/p>\n\n\n\n<p>The following analysis of the attack and the ultimate attribution were extracted from our final report of this incident to help the community take advantage of our research and apply the IOCs supplied to your controls to help prevent a similar attack on your enterprise.&nbsp;<\/p>\n\n\n\n<p><strong>Details of the Attack:&nbsp;<\/strong><\/p>\n\n\n\n<p>As the LMNTRIX CDC started the investigation to identify the attack chain, our team figured out that the client is using Zoho\u2019s ManageEngine application for IT Administration and management of all assets on their network. In the initial phase, the attack started with a brute force attack to login to the Zoho\u2019s ManageEngine. Then to get a proper shell, the attackers executed a known exploit against the public facing web application which was Zoho\u2019s ManageEngine.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-27.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Fig.1 Attack cycle diagram<\/em><\/p>\n\n\n\n<p><strong>Mapping to MITRE:&nbsp;<\/strong><\/p>\n\n\n\n<p>In the following image, the attacker techniques and the details of the entire attack cycle were identified using MITRE\u2019s ATT&amp;CK Framework.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-28.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><em>Fig.2. Mapping to MITRE ATT&amp;CK Framework<\/em><\/p>\n\n\n\n<p><strong>Initial Access:<\/strong><\/p>\n\n\n\n<p>The attack was initiated with a brute force attack to login to the Zoho\u2019s ManageEngine. And a proper shell was acquired by executing a known exploit against the public facing web application which was&nbsp;<strong>Zoho\u2019s ManageEngine (CVE-2020-10189).<\/strong>&nbsp;Upon observing the activities of the LMNTRIX network sensors on the LMNTRIX XDR, we found that there was a brute force attack going on from external IP addresses on an internal application which was exposed externally. This application is Zoho\u2019s ManageEngine Plus which is used for Active Directory management and administration. Upon checking the logs of ManageEngine, there were new users created for persistence. The artifacts was found placing&nbsp;<strong>.vbs&nbsp;<\/strong>script inside the home directories of all domain users.&nbsp;<\/p>\n\n\n\n<p>The attacker enumerated the Active Directory to understand the network topology and critical server infrastructure of the company\u2019s network.<\/p>\n\n\n\n<p><strong>Execution:&nbsp;<\/strong><\/p>\n\n\n\n<p>Powershell was used to download and execute the ransomware on the machines. Both the PowerShell script and vbs scripts were identified which was used during the attack.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-29.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Fig.3. Powershell Script which was used to download the Ransomware payload.<\/em><\/p>\n\n\n\n<p><strong>Persistence:&nbsp;<\/strong><\/p>\n\n\n\n<p>Registry run keys were used by the attacker to maintain persistence. The following registry keys were used to download the ransomware from the URL (https[:]\/\/www[.]solucionesajax[.]com\/userfiles\/chang[.]txt) and execute it on the client machines.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-30.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><em>ig.4. Registry run keys to download and execute ransomware<\/em><\/p>\n\n\n\n<p>Additionally, below given logon script was used to infect the domain controllers. The&nbsp;<strong>\u201c.VBS\u201d<\/strong>&nbsp;script named as&nbsp;<strong>\u201cjest.vbs\u201d<\/strong>&nbsp;was on one of the infected domain controllers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-31.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><em>Fig.5. VBS script to execute ransomware saved on NetLogon folder of DC<\/em><\/p>\n\n\n\n<p>On performing organization-wide search to find this vbs script in the entire environment, another script was found. As the domain controller name was different in the UNC path, and these scripts (with source file referring to different domain controllers) were automatically replicated with all the domain controllers because these were saved in the NETLOGON folder of all the domain controllers.&nbsp;<\/p>\n\n\n\n<p><strong>Defense Evasion:<\/strong><\/p>\n\n\n\n<p>\u2013&nbsp;&nbsp; &nbsp;All the antivirus definitions were deleted, and all the commands were executed in the hidden windows. &nbsp;<\/p>\n\n\n\n<p>\u2013&nbsp;&nbsp; &nbsp;Added a copy of itself with different name in the \u201cC:\\ProgramData\u201d directory and installs system startup script via registry.<\/p>\n\n\n\n<p>\u2013&nbsp;&nbsp; &nbsp;The executable was UPX modified and packed with \u201cUPX 2.90 [LZMA] -&gt; Markus Oberhumer, Laszlo Molnar &amp; John Reiser\u2019. &nbsp;It was further modified manually as an anti-reversing technique.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-32.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Credentials access:<\/strong><\/p>\n\n\n\n<p>Attackers dropped a modified version of mimikatz, named as, x64.exe to harvest user credentials from the infected systems and elevate privileges. The mimikatz commands were shortened as well to evade detection. The mimikatz performed password dump, token elevation to get NT Authority\\SYSTEM<\/p>\n\n\n\n<p>command used \u2013&nbsp;<\/p>\n\n\n\n<p>C:\\ProgramData\\x64.exe go::inc get::pwz token::getsys read::samz exit<\/p>\n\n\n\n<p>the process x64.exe is actually modified version of Mimikatz which is used to dump the credentials and elevate privileges.<\/p>\n\n\n\n<p><strong>Discovery:<\/strong><\/p>\n\n\n\n<p>Forensics analysis on the system further revealed reconnaissance on the system and network. The attackers attempted to get information from ManageEngine and the information obtained is used to gain an understanding of applications running within the network where they came to know about Citrix Application and created a similar GPO.<\/p>\n\n\n\n<p>The Ransomware sample \u2018Recover.exe\u2019 enumerated running processes and killed most of them. Below are the Kill process details:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-33.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Fig 6: Process Kill commands<\/em><\/p>\n\n\n\n<p><strong>Collection:<\/strong><\/p>\n\n\n\n<p>Attacker tried to read sensitive data from web browsers like Google Chrome and Mozilla Firefox by reading the \u2018secmod\u2019 file while encrypting the data:&nbsp;<\/p>\n\n\n\n<p>Original file= C:\\Users\\%username%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\default\\secmod.db&nbsp;&nbsp; &nbsp;<\/p>\n\n\n\n<p>Modified file= C:\\Users\\%username%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\default\\secmod.db.jest&nbsp;&nbsp; &nbsp;<\/p>\n\n\n\n<p><strong>Impact:<\/strong><\/p>\n\n\n\n<p><em><strong>Turned off backup and removed windows volume shadow copies.&nbsp;<\/strong><\/em><\/p>\n\n\n\n<p>\u2013&nbsp;&nbsp; &nbsp;Deleted the windows volume shadow copies and removed built-in operating system data and turned off services designed to aid in the recovery of a corrupted system to prevent recovery.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-34.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Fig.7. Deleting backups<\/em><\/p>\n\n\n\n<p><strong><em>Deleted all system logs:&nbsp;<\/em><\/strong><\/p>\n\n\n\n<p>\u2013&nbsp;&nbsp; &nbsp;Deleted all system logs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-35.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Fig.8. Deleted system logs<\/em><\/p>\n\n\n\n<p><em><strong>Encryption and file renaming:&nbsp;<\/strong><\/em><\/p>\n\n\n\n<p>\u2013&nbsp;&nbsp; &nbsp;Renames multiple user files and performed encryption. The files were renamed with a .jest extension.&nbsp;<\/p>\n\n\n\n<p><em><strong>Defacement:<\/strong><\/em><\/p>\n\n\n\n<p>\u2013&nbsp;&nbsp; &nbsp;Sets the desktop wallpaper to deliver message, show decryption nodes and to ask the ransom with the bitcoin address.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-36.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Fig. 9. Ransomware wallpaper<\/em><\/p>\n\n\n\n<p><strong>Lateral Movement Hunting:&nbsp;<\/strong><\/p>\n\n\n\n<p>LMNTRIX CDC team, took up lateral movement hunting to look deeper and broader throughout the network for other events that might be related. During the hunting process, it was observed registry run keys that contained suspicious certutil and PowerShell commands which were used to download the ransomware and start execution. Below is the screenshot of those registry run keys:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-37.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Fig. 10. Registry run keys downloading ransomware<\/em><\/p>\n\n\n\n<p>In the investigation phase, our team found that those registry keys were there because of a group policy. Upon performing the GPO Enumeration, the related GPO responsible for deploying these registry keys to the whole domain was discovered which was done by the attackers. It was named as&nbsp;<strong>\u201cCitrix manage\u201d.<\/strong>&nbsp;This was a tradecraft technique employed by the attacker as the victim organization was using Citrix Netscalar, so it would look legitimate GPO.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-38.webp\" alt=\"\" style=\"aspect-ratio:1;width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><em>Fig. 11. GPO to deploy malicious registry run keys in whole domain&nbsp;<\/em><br><br>As the Group Policy refreshes every 90 minutes and spreads the registry run keys on all the systems in the domain, it makes sure if any new system joins the network it also gets infected with Ransomware. &nbsp;<br><br>As soon as the GPO was disabled, policy changes were updated in the entire domain. This stopped the infection process across the domain.&nbsp;<br><br><strong>Ransomware Sample Analysis:&nbsp;<\/strong><br><br><em><strong>Payload \u2013 \u201crecover.exe\u201d<\/strong><\/em><br><br>&nbsp;&nbsp;<strong>&nbsp;&nbsp;SHA256:<\/strong>&nbsp;&nbsp; 8c628b1925412a07b99cd8c1d41264b8725953720ab4b9e3b5dcfe62988b70eb&nbsp;&nbsp; &nbsp;<br><br>&nbsp;&nbsp;<strong>&nbsp;&nbsp;SHA1:<\/strong>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;7afece8aa7e4741374285ac5e5162dd2a5b5ed87&nbsp;&nbsp; &nbsp;<br><br>&nbsp;&nbsp; &nbsp;<strong>MD5: &nbsp;<\/strong>&nbsp;&nbsp; &nbsp; &nbsp; d41bf45aca8314d48f43fef0b682ed3b<br><br>Once the \u2018Recover.exe\u2019 executable was executed on a machine, it performs below activities:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Process recover.exe started<\/strong>\n<ul class=\"wp-block-list\">\n<li>Created a child process with same name recover.exe\n<ul class=\"wp-block-list\">\n<li>Forcefully kills processes<\/li>\n\n\n\n<li>Deletes backups<\/li>\n\n\n\n<li>Creates processes with hidden window<\/li>\n\n\n\n<li>Deletes antivirus definitions<\/li>\n\n\n\n<li>Executes encoded PowerShell script<\/li>\n\n\n\n<li>Deletes all logs from the system<\/li>\n\n\n\n<li>Encrypts and renames files&nbsp;<\/li>\n\n\n\n<li>Changes the wallpaper&nbsp;<\/li>\n\n\n\n<li>Runs mimikatz<\/li>\n\n\n\n<li>Installs system startup script or application<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Below is the detailed version of all the processes and commands executed by recover.exe:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-39.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Fig.12. Details of processes and commands<\/em><\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; &nbsp; The command in row 15 is actually encoded command to clear all the logs:&nbsp;<\/p>\n\n\n\n<p><strong><em>&nbsp; &nbsp; &nbsp;wevtutil el | Foreach-Object {wevtutil cl \u201c$_\u201d}&nbsp;<\/em><\/strong><\/p>\n\n\n\n<p><strong>Attacker Attribution:<\/strong><\/p>\n\n\n\n<p>After successful completion of the Incident Response and Mitigation, LMNTRIX CDC was involved in the attacker attribution to figure out the threat actors legion involved on this attack. Attackers hosted their malwares on a previously breached webserver under the following URL \u2013 \u201chttps[:]\/\/www[.]solucionesajax[.]com\/userfiles\/\u201d.<\/p>\n\n\n\n<p>Our team quickly gained access and downloaded copies of all the files present in the sub-folder used by the attackers. Upon analysis, the following information was found:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Filename<\/td><td>MD5<\/td><td>File Size<\/td><td>Actual File Type<\/td><td>Remarks<\/td><\/tr><tr><td>ti.txt<\/td><td>1c0c840c05b461dc1678926cb5f14076&nbsp;<\/td><td>58&nbsp;&nbsp; &nbsp;<\/td><td>txt&nbsp;<\/td><td>Banner<\/td><\/tr><tr><td>g.txt&nbsp;&nbsp;<\/td><td>1f51b8f7938e232b3b445f3c18f94db2<\/td><td>774<\/td><td>PHP<\/td><td>Webshell<\/td><\/tr><tr><td>gans.txt&nbsp;<\/td><td>1f51b8f7938e232b3b445f3c18f94db2<\/td><td>774<\/td><td>PHP&nbsp;<\/td><td>Webshell<\/td><\/tr><tr><td>black_php(1).tx<\/td><td>2bb0597d5d0c9c27a8fe85d318081f97<\/td><td>12931<\/td><td>txt&nbsp;<\/td><td>Banner<\/td><\/tr><tr><td>black_php.txt&nbsp;<\/td><td>2bb0597d5d0c9c27a8fe85d318081f97<\/td><td>12931<\/td><td>txt&nbsp;<\/td><td>Banner<\/td><\/tr><tr><td>\u805a\u96e8\u56e2\u961f\u9ed1\u9875.txt<\/td><td>2bb0597d5d0c9c27a8fe85d318081f97&nbsp;<\/td><td>12931<\/td><td>txt&nbsp;<\/td><td>Banner<\/td><\/tr><tr><td>gans(1).txt<\/td><td>3c7f92dda4a9c5f4123da5228cfa5c12<\/td><td>774<\/td><td>txt&nbsp;<\/td><td>Webshell<\/td><\/tr><tr><td>g(1).txt<\/td><td>46e519882ea1f4acac801a73e1ee7aac&nbsp;&nbsp;<\/td><td>773<\/td><td>txt&nbsp;<\/td><td>Webshell<\/td><\/tr><tr><td>putty.txt<\/td><td>4798ec7788a4d768005489abbc8814d7&nbsp;&nbsp;<\/td><td>712176&nbsp;&nbsp;<\/td><td>txt<\/td><td>Legitimate Putty<\/td><\/tr><tr><td>1228.txt&nbsp;<\/td><td>4ab863abc2ccbb75372b3813aecd3277&nbsp;&nbsp;<\/td><td>157&nbsp;&nbsp; &nbsp;<\/td><td>txt<\/td><td>Banner<\/td><\/tr><tr><td>00f5013ad4d34b5ff78c5303d6c0cc73.pdf&nbsp;<\/td><td>80a16c1d3641dba77ca62687e0dc564a&nbsp;&nbsp;<\/td><td>93020&nbsp;&nbsp; &nbsp;<\/td><td>pdf&nbsp;&nbsp; &nbsp;<\/td><td>PDF<\/td><\/tr><tr><td>chang.txt<\/td><td>d41bf45aca8314d48f43fef0b682ed3b&nbsp;&nbsp; &nbsp;<\/td><td>7408128&nbsp;&nbsp;<\/td><td>txt&nbsp;&nbsp; &nbsp;<\/td><td>Ransomware, Drops Modified Mimikatz<\/td><\/tr><tr><td>sskecil(1).txt<\/td><td>ec03790865a1d290db4eb3d1e1e8878e&nbsp;&nbsp;<\/td><td>103<\/td><td>txt&nbsp;&nbsp;<\/td><td>PHP executed Webshell from Github<\/td><\/tr><tr><td>sskecil.txt<\/td><td>ec03790865a1d290db4eb3d1e1e8878e&nbsp;&nbsp;<\/td><td>103<\/td><td>txt&nbsp;&nbsp;<\/td><td>PHP executed Webshell from Github<\/td><\/tr><tr><td>2294.xml<\/td><td>fb9ca6b458e76fde8be590643f89426a&nbsp;&nbsp; &nbsp;<\/td><td>6<\/td><td>xml&nbsp;&nbsp;<\/td><td>N\/A<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>From the collected samples and banners, it was clear that multiple threat actors are directly related to these malwares. Even though the banners give out the names of attackers who were involved in the attack, the presence of multiple banners and combination of threat actors reveal that these groups have breached and placed their malwares at one point of time or another. Additionally, the malware samples resemble known RATs which have their own attribution, signifying that the attackers have leveraged the network of Black Hat hackers to purchase tools, form alliances and carry out attacks in phases. &nbsp;<\/p>\n\n\n\n<p>This opportunity allowed LMNTRIX to further understand the partnership formed between different threat actors which could multiply the impact on the victim organization. To start with :-<\/p>\n\n\n\n<p><strong>Threat Group: Sunda Cyber Army<\/strong><\/p>\n\n\n\n<p><strong>Primary TTP:<\/strong>&nbsp;Exploiting Public-Facing Applications to gain ability to write files on compromised webserver.<\/p>\n\n\n\n<p><strong>Known For:<\/strong>&nbsp;Website Defacement \u2013 recorded over 170 defacements since June 2019.<\/p>\n\n\n\n<p><strong>star<\/strong><\/p>\n\n\n\n<p>A known hacker persona with over recorded 140 websites. The attacker had defaced the ransomware serving website \u201cwww[.]solucionesajax[.]com\u201d on February 1, 2020<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-40.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>.\/Hndra666<\/strong><\/p>\n\n\n\n<p>An active member of Sunda Cyber Army, who has been an active member in many attacks but not in a leading role.<\/p>\n\n\n\n<p><strong>Rizky07 (C3P0T)<\/strong><\/p>\n\n\n\n<p>A known hacker persona who has recorded over 1000 defacements since June 2019 under their own name. Has also been a part of multiple attacks carried out by Sunda Cyber Army<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-41.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Bogor People<\/strong><\/p>\n\n\n\n<p>A term commonly used to refer Indonesian natives. This phrase is often used by the Threat Group within its banners to show that they represent the Indonesian population and other unlisted members of the Sunda Cyber Army.<\/p>\n\n\n\n<p><strong>Threat Group: PsychoXploit<\/strong><\/p>\n\n\n\n<p><strong>Primary TTP:<\/strong>&nbsp;Exploiting Public-Facing Applications to gain ability to write files on compromised webserver.<\/p>\n\n\n\n<p><strong>Known for:<\/strong>&nbsp;Website Defacement \u2013 recorded over 2400 defacements since March 2020.<\/p>\n\n\n\n<p><strong>GHz7<\/strong><\/p>\n\n\n\n<p>A known hacker persona who has recorded over 1600 defacements since June 2019 under their own name. Has also been a part of multiple attacks carried out by PsychoXploit.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog-imgs\/post-img-42.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><strong>ladies2<\/strong><\/p>\n\n\n\n<p>This attacker has been a part of PsychoXploit as a passive member. Has recorded 6 defacements under their own name but as a member of another Threat Group \u201cIndonesian Error System\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xdr-mdr.lmntrix.com\/blog-imgs\/post-img-43.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><strong>ClownTerror072<\/strong><\/p>\n\n\n\n<p>This attacker has recorded over 3800 defacements under their own name. Some of these are also as member of different Threat Groups \u2013 \u201cIndonesian Error System\u201d, \u201cHacker Patah Hati\u201d, \u201cW3LL SQUAD\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xdr-mdr.lmntrix.com\/blog-imgs\/post-img-44.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><strong>prizeHdru<\/strong><\/p>\n\n\n\n<p>This attacker has recorded over 1400 defacements under their own name. Some of these are also as member of different Threat Group \u201cIndonesian Silent Coders\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xdr-mdr.lmntrix.com\/blog-imgs\/post-img-45.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><strong>.\/Vincent<\/strong><\/p>\n\n\n\n<p>This attacker has recorded 25 defacements under their own name. Some of these are also as member of different Threat Groups \u2013 \u201cHacker Patah Hati\u201d, \u201cSunda Cyber Army\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xdr-mdr.lmntrix.com\/blog-imgs\/post-img-46.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><strong>Xyp3r2667<\/strong><\/p>\n\n\n\n<p>A known hacker persona who has over 1300 recorded defacement attacks<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xdr-mdr.lmntrix.com\/blog-imgs\/post-img-47.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><strong>Zeylan7<\/strong><\/p>\n\n\n\n<p>This attacker has recorded 280 defacements under their own name. Some of these are also as member of different Threat Groups \u2013 \u201cIndonesian Error System\u201d, \u201cBaku Hantam Cyber Team\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xdr-mdr.lmntrix.com\/blog-imgs\/post-img-48.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p><strong>Threat Group: \u805a\u96e8\u56e2\u961f-\u9ed1\u56db (Juyu Team-Black IV)<\/strong><\/p>\n\n\n\n<p>This threat group has been primarily observed to perform defacement attacks on Chinese and Singapore websites.<\/p>\n\n\n\n<p><strong>\u53f6\u51e1 (Ye Fan)<\/strong><\/p>\n\n\n\n<p>We have identified this hacker persona from the group who has led the defacement for ransomware serving website.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xdr-mdr.lmntrix.com\/blog-imgs\/post-img-49.webp\" alt=\"\" style=\"width:840px;height:auto\"\/><\/figure>\n\n\n\n<p>LMNTRIX CDC\u2019s analysis of the ransomware sample reveals a Chinese connection, along with the evidence seen during the Incident Response, specifically where the attackers created AD user accounts with Chinese names, bring this Threat Group much closer to the center of attack attribution. While the other Threat Groups were involved only in the initial phase of the attack \u2013 where a website was compromised to host malicious files, this Chinese Threat Group was more involved in carrying out the actual attack \u2013 from initial infection to data destruction.&nbsp;<\/p>\n\n\n\n<p>On 2020-04-20<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: As the world plunges into the pandemic chaos, cyber attackers show little or no remorse on attacking enterprises, hospitals, and critical infrastructures using sophisticated techniques.&nbsp;FBI&nbsp;has warned against the rise of cyber attacks across the globe taking advantage of the crisis. One such sophisticated technique is to exploit the vendors product vulnerability in the Client [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":917,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=891"}],"version-history":[{"count":9,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/891\/revisions"}],"predecessor-version":[{"id":4079,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/891\/revisions\/4079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/917"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}