Android users soon can check-in for a flight via RCS, store their Boarding Pass in Google Wallet

0
[ad_1]
Google is looking to make flying less of a hassle. Currently, those with a Pixel 3 or newer model can take a screenshot of a boarding pass and have the digital image added to Google Pay. Tap on Save > View boarding pass. This will put your boarding pass in the Google Pay app where it can be viewed without an internet connection. At Google I/O yesterday, Google announced a new way for all Android users with the Messages by Google app to use the latter’s RCS chat to add a boarding pass to Google Wallet.

This would take place when an airline sends an Android user a message using RCS. The latter is the platform that Android users can employ for advanced messaging capabilities on their devices and delivers features such as end-to-end encryption, read receipts, higher-quality imaging, typing indicators, and more. Through the RCS message sent by the airline, the Android user will be able to complete the check-in process. The user will also have to be flying on an airline that supports this feature.

The API used for the boarding pass feature, the Generic Pass API, can also be used by developers to allow Google Wallet to house cards related to auto insurance, gym membership, parking, and more. A more secure version of the API, the Generic Private Pass API, is being used to house in the virtual wallet health insurance cards and ID cards containing information meant to be private.

As noted by 9to5Google, Google is adding support for barcodes that are only good for a limited amount of time before a new one is put on the screen. These “rotating barcodes” are used to help protect the user from screenshot fraud. In addition, the company that issues a boarding pass or ticket to an event can include an email that has to match with the email address listed for the specific Google Wallet app that will house the pass or ticket being sent. This can be requested by the issuer to prevent fraud, reselling, and improper transfers.
If you don’t have the Messages by Google app on your Android phone, you can install it by tapping on this link.

[ad_2]
Source link

British hacker pleads guilty to hacking schemes, faces 77 years in prison

0
[ad_1]

O’Connor, known as PlugwalkJoe on the internet, admitted to committing various offences such as computer intrusion, extortion, stalking, wire fraud, and money laundering, and entered a guilty plea.

UK citizen Joseph James O’Connor has pleaded guilty to multiple charges, including conspiring to commit computer intrusions, wire fraud, and money laundering, in connection with his cyberstalking and hacking schemes.

O’Connor was extradited to the US from Spain last month and has been charged in both North Dakota and New York. He was part of a hacking group that hacked over 130 Twitter accounts in July 2020.

O’Connor and his co-conspirators also took part in SIM swap attacks to steal $794,000 worth of cryptocurrency and gain unauthorized access to TikTok accounts belonging to public figures. O’Connor is scheduled to be sentenced on 23rd June and faces a maximum of 77 years in prison.

The cyberstalking and computer hacking schemes were flagrant and malicious, and O’Connor’s conduct impacted multiple people’s lives, causing substantial emotional harm, said Assistant Attorney General Kenneth Polite. 

The July 2020 Twitter attack involved taking over verified accounts, including those belonging to Joe Biden, Elon Musk, Barack Obama, Kim Kardashian, Bill Gates, Warren Buffet, Benjamin Netanyahu, Jeff Bezos, Michael Bloomberg, and Kanye West.

More Context:

  1. Mastermind of 2020’s Twitter hack sentenced to 3 Years
  2. Twitter hack’s mastermind trial Zoom bombed with porno

The group behind this attack allegedly used these accounts to ask for digital currency, which caused Twitter to suspend some of the verified accounts from posting any messages for a few hours until security was reinstated.

O’Connor’s group also employed sim card swapping to gain unauthorized access to the social media accounts of two media celebrities, TikTok star Addison Rae and actor Bella Thorne.

Joseph James O'Connor
Joseph James O’Connor (Image credit: Telegraph UK)

The group also threatened to expose private images and other personal information of the two individuals. The same SIM swapping technique was also used to target a Manhattan-based cryptocurrency company from which $794,000 were stolen and laundered.

O’Connor, known as PlugwalkJoe on the internet, admitted to committing various offences such as computer intrusion, extortion, stalking, wire fraud, and money laundering, and entered a guilty plea.

This case serves as a warning that the reach of the law is long, and criminals anywhere who use computers to commit crimes may end up facing the consequences of their actions in places they did not anticipate, said U.S. Attorney Ismail Ramsey for the Northern District of California. 

  1. Hacker Leaks 5.3M Twitter Accounts
  2. 400 Million Twitter Users’ Scraped Info Goes on Sale!
  3. Researcher logs into Trump’s Twitter with password MAGA2020

[ad_2]
Source link

Google’s New Dark Web Monitoring Feature for Gmail

0
[ad_1]
Google's New Dark Web Monitoring

Google declared that all Gmail users within the United States would shortly be able to utilize the dark web report security feature to determine whether their e-mail address has been found on the dark web.

Google already offers a dark web monitoring service to paid US customers through its Google One subscription service. Nonetheless, Google I/O today extended free security monitoring to all Gmail users. 

This enables Gmail users to search the dark web for their email addresses and implement security measures based on Google’s recommendations.

  • Improved data control and transparency
  • Gmail’s Dark Web Scan
  • Spam View in Google Drive
  • Effortless deletion of Maps search history
  • AI-powered Safe Browsing

“We’re expanding access to our dark web report in the next few weeks, so anyone with a Gmail account in the US will be able to run scans to see if your Gmail address appears on the dark web and receive guidance on what actions to take to protect yourself,” Google says.

Dark Web Monitoring

Additionally, Google will periodically alert Gmail users to see whether their email addresses have been connected to any data breaches resulting in darknet forum posts for cybercrime.

Subscribers to Google One can enable it by heading to Google One and selecting “Set up > Start monitoring” and “Dark web report.”

“Google One’s dark web report helps you scan the dark web for your personal info — like your name, address, email, phone number and Social Security number — and will notify you if it’s found,” said Google One Director of Product Management Esteban Kozak in March when the feature was first announced.

Google One users, according to Kozak, are also shown results for “other related info that may be found in those data breaches.”

“And if any matching info is found on the dark web, we’ll notify you and provide guidance on how you might protect that information.”

According to the company, it is possible to remove a profile from the dark web report settings or delete it and all personal information added to it from the monitoring profile.

Google also revealed today at Google I/O that it has enhanced its Safe Browsing service to recognize and block 25% more phishing attempts on Chrome and Android.

Additionally, the business has improved Google Maps’ search history deletion capability and added a new spam view to Google Drive.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus


[ad_2]
Source link

Uncovering RedStinger – Undetected APT cyber operations in Eastern Europe since 2020

0
[ad_1]

We discovered a new interesting lure that targeted the Eastern Ukraine region and started tracking the threat actor behind it.

This blog post was authored by Malwarebytes’ Roberto Santos and Fortinet’s Hossein Jazi

While the official conflict between Russia and Ukraine began in February 2022, there is a long history of physical conflict between the two nations, including the 2014 annexation of Crimea by Russia and when the regions of Donetsk and Luhansk declared themselves independent from Ukraine and came under Russia’s umbrella. Given this context, it would not be surprising that the cybersecurity landscape between these two countries has also been tense. 

While looking for activities from the usual suspects, one of our former coworkers at Malwarebytes Threat Intelligence Team discovered a new interesting lure that targeted the Eastern Ukraine region and reported that finding to the public. Moreover, we started tracking the actor behind it, which we internally codenamed Red Stinger.

This investigation remained private for a while, but Kaspersky recently published information about the same actor (who it called Bad Magic). Now that the existence of this group is public, we will also share some of our information about the actor and its tactics.

Our investigation could be helpful to the community as we will provide new undisclosed data about the group. We have identified attacks from the group starting in 2020, meaning that they have remained under the radar for at least three years. Additionally, we will provide insights into the latest campaigns performed by Red Stinger, where we have found that the group has targeted entities in different places of Ukraine.

Military, transportation and critical infrastructure were some of the entities being targeted, as well as some involved in the September East Ukraine referendums. Depending on the campaign, attackers managed to exfiltrate snapshots, USB drives, keyboard strokes, and microphone recordings.

Finally, we will reveal unknown scripts and malware run by the group in this report.

Timeline

Our investigation started in September 2022, when one of our former coworkers Hossein Jazi discovered an interesting lure, that seemed to target some entities over the war context:

Tweet published by @hjazi in September 2022

In fact, this is the attack that Kaspersky analyzed in its blog. However, this was not the only activity carried out by the group. Malwarebytes has identified multiple operations, first dated in 2020. The next infographic shows some of the operations recognized by us:

Operations performed by Red Stinger

Since our investigation started in September 2022, information about the initial campaigns has been limited. However, the actor’s tactics, techniques, and procedures (TTPs) are very distinctive, which gives us a high level of confidence in our attribution.

Notes about activity before the war

OP#1 – Late 2020

The first operation we know of happened in December 2020. Although the infection chain is similar to what was already reported, the attackers were using a slightly different process back in 2020:

OP#1 Infection phase

An MSI file is downloaded from hxxp://91.234.33.185/f8f44e5de5b4d954a83961e8990af655/update.msi. This first MSI file, when executed, will show the following error to the user:

MSI file used in OP#1

In the background, this MSI file will execute a .vbs file that runs a dll file. The content is encoded using base64:

Contents of zip file and detail of shortcut.vbs

So finally, cachelib.dll will be executed. That file will drop two files named iesync.so and iesync.vbs.

iesync.so and iesync.vbs were dropped as part of OP#1 infection phase

After that, the iesync.vbs file will apply a XOR operation to iesync.so. After applying that conversion to the file, we can see that this file is what we called DBoxShell (also called PowerMagic by Kaspersky):

DboxShell variant used in OP#1

OP#2 – April 2021

We believe that the attack started with this zip file named ПОСТАНОВЛЕНИЕ № 583-НС.zip. How attackers sent this file to victims is still unknown. The lure in this case was themed about Luhansk:

Lure used in OP#2

A valid translation of this document would be:

RESOLUTION

dated March 25, 2021 No. 584-NS

Lugansk

On consideration in the second reading of the draft law

of the Luhansk People’s Republic dated March 19, 2021 No 417-PZ / 21-3

“On Amendments to the Law of the Luhansk People’s Republic

“On physical culture and sports”


ПОСТАНОВЛЕНИЕ № 583-НС.zip contains a lnk file as well as the previous pdf. This .lnk file will download an MSI file from the url hxxp://91.234.33.108/u3/ebe9c1f5e5011f667ef8990bf22a38f7/document.msi, and from there, the attack is pretty similar as the one performed in OP#1. Just a few differences to note, for example, in this case the dll used is named libsys.dll.

Dll used  at infection phase in OP#2

Also, as the image shows, paths used the folder winappstorepackage or WinStoreApps instead of CacheWidgets, that was used in OP#1. Also, the powershell script is slightly different in this case:

Powershell snippet run in OP#2

Nevertheless, the infection phase finally used DBoxShell, as before.

OP#3 – September 2021

We have very little information about this operation, but based on the TTPs, we have identified overlapping techniques with both previous and subsequent attacks.

  • MSI files usage is a known signature from the group. Also, the MSI file was downloaded from hxxp://185.230.90.163/df07ac84fb9f6323c66036e86ad9a5f0d118734453342257f7a2d063bf69e39d/attachment.msi. Note the common pattern in urls.

  • 185.230.90.163 belongs to ASN number 56485. All IPs used from 2020 till now belong to the same ASN.

  • VT telemetry showed common patterns with OP#2.

Activity at the onset of war

After the war began, we collected information about two distinct operations.  

OP#4 – February 2022

OP#4 is perhaps one of the most interesting attacks performed by the group. As you can see in the following lines, this attack still has some characteristics that led us to attribute it to Red Stinger. Furthermore, the attack has some unique features that make it stand out as one of the most interesting ones.

In this case, the group used hxxp://176.114.9.192/11535685AB69DB9E1191E9375E165/attachment.msi to download the malicious MSI file. Note once more this common pattern in all URLs used by the group. This MSI file contained a PDF, a .vbs file, and a .dat file:

Lure used in OP#4

The group followed a similar infection chain as in previous operations. Finally, a .vbs file was responsible for XORing and executing a .dat file, which contained a small loader and a variant of DBoxShell:

DboxShell variant used in OP#4

DBoxShell is malware that utilizes cloud storage services as a command and control (C&C) mechanism. This stage serves as an entry point for the attackers, enabling them to assess whether the targets are interesting or not, meaning that in this phase they will use different tools.

A better look of how RedStinger operates can be seen in the next infographic:

Common pattern in Red Stinger operations

After the infection phase, we are aware that actors dropped at least the following artifacts:

SolarTools

In the reconnaissance phase, we noticed the execution of 2 MSI files named SolarTools.msi and Solar.msi. Both had inside tools named ngrok.exe and rsockstun.exe:

  • Ngrok.exe is a legitimate tool that allows web developers to deploy applications and expose services to the internet. Other groups also used ngrok for malicious purposes.

  • Rsockstun is a tool that allows attackers to route connections through external proxies.

More important, we have seen the same version of Solar.msi (02f84533a86fd2d689e92766b1ccf613) on OP#4 and OP#5, allowing us to connect the dots between these two attacks.

vs_secpack.msi

In addition to SolarTools, starting the exfiltration phase, we also found another file named vs_secpack.msi. This file contains two files: ntinit.exe and ntuser.dat, which will be located under c:/ProgramData/NativeApp. Ntinit.exe is a file that was developed as a Windows Service, named ntmscm.

Service created by ntinit.exe

Inside that service, eventually a thread will be executed. This thread contains all the functionality. Its main purpose is to execute one of the binaries hidden inside ntuser.dat, after some parsing. Also, it will execute C:/ProgramData/user.dat, if found.

vs_secpack.msi will drop ntuser.dat and ntinit.exe files

Ntuser.dat is an aggregation of PE files with a leading header and a final chunk. These executables are xored, each one with a different value. The next image shows the header:

Detail of Ntuser.dat header

This header can be seen as a C structure, defined like this:

struct head_FirstChunk{
    DWORD signature;
    DWORD osInstallDate;
    int sizeMz1;
    int sizeMz2;
    int sizeMz3;
    int sizeMz4;
    int sizeConfig;
    DWORD xorValsMZ1;
    DWORD xorValsMZ2;
    DWORD xorValsMZ3;
    DWORD xorValsMZ4;
}

Following this header, four PE files are stored consecutively and XORed. As the previous structure shows, the size and XOR value used to decode these files can be recovered from the header.

ntuser.dat contents

We won’t analyze all MZs one by one, as we want to avoid overwhelming the reader with technical details that are out of scope. For a quick reference, the first MZ was a copy of ntinit.exe and the second was a dll capable of injecting files using the Process Doppelganging technique. Curiously, InjectorTransactedHollow.dll string was found inside the binary, so possibly that was how attackers named the file originally:

Process Hollowing technique was used to perform injections in OP#4

The third was also used for injection purposes. The fourth was the most interesting, because it communicates with a new Dropbox account. Some of these will be injected or used to inject MZs into legitimate process mobisync.exe

Finally, the last chunk of ntuser.dat was a configuration file. The configuration was encrypted, and looked like this:

Config file forms the end of ntuser.dat

That configuration was encrypted using AES. The IV is the first 16 bytes of the config. The key can be recovered from the fourth MZ. In fact, this executable will use this configuration to communicate with Dropbox.

Decrypted configuration is shown next:

Decrypted config file

This configuration is pretty representative of the group’s motivation. First of all, we see a new Dropbox account being used. This Dropbox account will be used to gather exfiltrated victims data. It can be seen like the exfiltration phase starts here. Note that attackers will use one account for reconnaissance and a different one for exfiltration.

The object field was also revealing. It contained a Russian name (redacted for privacy) followed by the DNR letters (probably Donetskaya Narodnaya Respublika, referring to one of the cities declared independent in 2014, and a known target to the group). Victimology will be discussed later.

OP#5

OP#5 was the last known activity we will cover. As Kaspersky already revealed some technical details about this operation, we won’t repeat that analysis again. A link to the analysis made by them can be found at the beginning of this report.

What we can do here is provide some extra insights regarding the attack. Let’s start at the Reconnaissance phase. Reconnaissance phase starts right after DBoxShell / GraphShell is executed. This is the GraphShell version used in OP#5:

OP#5 used GraphShell instead of DBoxShell

The way GrapShell works is pretty simple, and also can be almost guessed by viewing the image. A folder tree is created:

Root

       \___ AmazonStore

                             \___ clients

                             \___ tasks

                             \___results

And as DBoxShell does, clients will hold heartbeats from clients, tasks will store tasks that will be executed at some point by victim systems, and results will be uploaded to results.

DETAIL – RECONNAISSANCE PHASE

As we were actively tracking the actors for a while, we managed to recover most of the actions performed by the attackers at this phase:

Support app used

Date (UTC)

Event

 

2022-09-23

Investigation starts

 

2022-09-24T02:53

Документи (Documents) folder is created in OneDrive

 

2022-09-24T02:53

Програми (Programs) folder is created in OneDrive

 

2022-09-24T02:53

JimmyMorrison43 folder is created under Documents, in OneDrive

 

2022-09-24T02:54

Робочий стіл (Desktop) folder is created in OneDrive

ListFiles

2022-09-24T10:25

Attackers sent a command to victim #1. Attackers were trying to list user files, as shown in the image

StartNgrok#1

2022-09-24T10:56

Attackers sent another command to victim #1.

This command is a powershell script with 32 lines, which executes SolarTools/ngrok.exe.

 

2022-09-25T16:09

An additional victim was found infected (Victim #4)

 

2022-09-27T10:01

An additional victim was found infected (Victim #5)

 

2022-09-28T05:07

An additional victim was found infected (Victim #6)

 

2022-09-28T05:17

An additional victim was found infected (Victim #7)

SysInfo

2022-09-28T06:14

A new command is sent to Victim #6. The command looks to be a basic reconnaisance

 

2022-09-28T06:14

ListFiles performed to Victim #6

SysInfo

2022-09-28T06:15

A new command is sent to Victim #7. The command looks to be a basic reconnaisance

 

2022-09-28T06:15

ListFiles performed to Victim #7

StartNgrok#2

2022-09-28T07:54

Attackers shown interest in Victim #6. They have installed an ngrok application to them, downloaded from

hxxp://185.166.217.184:2380/ApplicationSolarInstall_q3457y3487wy4t4bheors/Solar.msi 

StartNgrok#1

2022-09-28T07:55

Attackers executed ngrok powershell in Victim #6 machine.

 

2022-09-28T08:22

An additional victim was found infected (Victim #8)

 

2022-09-28T11:37

An additional victim was found infected (Victim #9)

 

2022-09-28T13:21

An additional victim was found infected (Victim #10)

ListVars

2022-09-28T17:38:43

A new task is sent to Victim #8

ListVars

2022-09-28T17:48:12

New task to Victim

InstallNewPZZ

2022-09-29T06:58

InstallNewPZZ.ps1 was sent to Victim#6

InstallNewPZZ

20220929_06:59:21

InstallNewPZZ.ps1 was sent to Victim#1

InstallNewPZZ

20220929_06:59:49

InstallNewPZZ.ps1 was sent to Victim#4

InstallNewPZZ

20220929_07:00:28

InstallNewPZZ.ps1 was sent to Victim#7

InstallNewPZZ

20220929_07:06:22

InstallNewPZZ.ps1 was sent again to Victim#1

 

20220929_07:11:30

ps command was sent to Victim#6

 

20220929_07:11:45

ps command was sent to Victim#7

 

20220929_07:13:13

All.exe and ps was executed in Victim#6

 

20220929_07:13:30

All.exe and ps was executed in Victim#7

 

20220929_07:20:20

ps executed again in Victim#6

 

20220929_07:21:45

ls -r “C:\ProgramData\CommonCommand”

  executed in Victim#6

 

MISSED FILE

[MISSED FILE] – probably schtasks /query

 

20220929_07:25:08

schtasks /run /tn “Synchronization

  App” and ps executed in Victim#6

 

20220929_07:27:11

schtasks /run /tn “Synchronization

  App” and ps executed in Victim#7

 

20220929_07:30:23

ls -r “C:\ProgramData\CommonCommand”

  and schtasks /query sent to Victim#7

InstallNewPZZ

20220929_07:33:34

InstallNewPZZ.ps1 modification sent to Victim#7

 

20220929_07:35:41

ls -r “C:\ProgramData\CommonCommand” ,

  schtasks /query and ps sent to Victim#7

InstallNewPZZ

20220929_08:01:30

InstallNewPZZ.ps1 modification sent to Victim#7

 

20220929_08:03:16

ls -r “C:\ProgramData\CommonCommand” ,

  schtasks /query and ps sent to Victim#7

SysInfo

20220929_08:05:27

sysinfo.ps1 sent to Victim#1

InstallNewPZZ

20220929_08:16:38

InstallNewPZZ.ps1 sent to Victim#8

 

20220929_08:17:17

ls -r “C:\ProgramData\CommonCommand”

  and ps sent to Victim#7

 

20220929_08:19:07

sysinfo.ps1 sent to Victim#1

 

20220929_08:27:07

ls “C:\Program Files (x86)\Internet

  Explorer” sent to Victim#7

InstallNewPZZ

20220929_08:30:17

InstallNewPZZ.ps1 sent to Victim#7

 

20220929_08:34:27

ls -r “C:\ProgramData\CommonCommand”

  sent to Victim#7

InstallNewPZZ

20220929_08:35:33

InstallNewPZZ.ps1 modification sent to Victim#7

 

20220929_08:38:13

ls C:\ProgramData sent to Victim#1

InstallNewPZZ

20220929_08:38:57

InstallNewPZZ.ps1 modification sent to Victim#7

InstallNewPZZ

20220929_08:41:12

InstallNewPZZ.ps1 modification sent to Victim#7

InstallNewPZZ

20220929_08:41:10

InstallNewPZZ.ps1 modification sent to Victim#1

InstallNewPZZ

20220929_09:53:07

InstallNewPZZ.ps1 modification sent to Victim#2

 

20220929_11:41:06

ls -r “C:\ProgramData\CommonCommand”

  and schtasks /query sent to Victim#2

InstallNewPZZ

20220929_11:44:52

InstallNewPZZ.ps1 modification sent to Victim#2

 

20220929_11:46:09

ps sent to Victim#2

InstallNewPZZ

20220929_12:42:48

InstallNewPZZ.ps1 modification sent to Victim#2

 

20220929_12:43:02

ls -r “C:\ProgramData\CommonCommand”

  sent to Victim#7

 

20220930_06:10:41

StartNgrok.ps1

InstallNewPZZ

20220930_06:17:40

InstallNewPZZ.ps1 modification sent to Victim#1

 

20220930_06:18:01

ls -r “C:\ProgramData\CommonCommand”

  and schtasks /query sent to Victim#7

InstallNewPZZ

20220930_06:22:50

InstallNewPZZ.ps1 modification sent to Victim#7

InstallNewPZZ

20220930_06:24:10

InstallNewPZZ.ps1 modification sent to Victim#7

 

20221003_07:28:08

AppsJustForFunNoMatterWhatYouWant sent to Victim#1

Ld_dll_loader

20221003_07:28:24

ld_dll_loader.ps1 executed in Victim#1

 

20221003_07:28:41

ls “C:\ProgramData\” and ps executed

  in Victim#1

Ld_dll_loader

20221003_07:28:57

ld_dll_loader.ps1 executed in Victim#2

Ld_dll_loader

20221003_07:42:51

ld_dll_loader.ps1 executed in Victim#2

 

20221003_07:43:07

ls “C:\ProgramData\” and ps executed

  in Victim#2

StartRevSocks

20221005_14:25:50

StartRevSocks.ps1 was executed at Victim#3 

 

20221007_07:32:24

New Client

 

20221007_14:46:49

New Client

 

Below are indicated some of the scripts used in this phase:

ListFiles

StartNgrok

Reconnaissance

InstallPZZ

Ld_dll_loader

StartRevSocks

After that, by using some of the tooling analyzed by Kaspersky, the exfiltration phase starts.

Victimology

OP#4

As this operation happened before our investigation started, we cannot determine how many victims were infected. However, at the time we began monitoring, we still had information about two victims. Surprisingly, these two victims were located in central Ukraine. This is interesting because all the information had previously pointed to East Ukraine, where the Donbass region is located.

Map of Ukraine, where known targets in OP#4 were highlighted

One of the victims was a military target, but the activity on this target was only carried out for a few hours. We have reason to believe that the user noticed something wrong, and executed an antimalware solution shortly after being infected, which likely detected and cleaned the system. 

As far as we know, attackers managed to exfiltrate on this target several screenshots, microphone recordings and some office documents.

The other victim we found was located in Vinnitsya. Target was an officer working in critical infrastructure. Attackers made a great and long surveillance of this victim, which extended until Jan 2023. They have exfiltrated screenshots, microphone and office documents, but also keystrokes were uploaded.

OP#5

With the victimology shared in OP#4, we may think that this was a group targeting only UA-aligned entities. However, the analysis of OP#5 revealed an interesting fact: it mainly targeted RU-aligned entities.

REFERENDUM TARGETS

OP#5 started in September 2022. Back in those days, Russia made referendums at Luhansk, Donetsk, Zaporizhzhia and Kherson. While that was happening, Red Stinger targeted and made surveillance to officers and individuals involved in those elections. 

Two victims attacked in OP#5 were workers at Yasinovataya Administration (Donetsk). Another victim was also part of DPR administration, in Port Mariupol. All of them were performing different activities regarding elections. We also have found one victim holding the advisor position from CEC (Central Election Commission). According to Wikipedia, “The Central Election Commission of the Russian Federation (Russian: Центральная избирательная комиссия Российской Федерации, abbr. ЦИК, also Центризбирком) is the superior power body responsible for conducting federal elections and overseeing local elections in the Russian Federation”.

Central Election Commission of the Russian Federation (CIK) stamp

Regarding CEC, we had seen another victim codenamed CIK_03D502E0. CIK is also another term that could refer to CEC. Attackers showed great interest in this one, as this victim was one of the only ones with its own name (some were just identified by using a drive ID). Also, USB drives from that victim were uploaded. Next image shows a small fraction of filenames exfiltrated by the attackers. To clarify, TИK probably stands for TEC (Territorial Election Commision).

Detail of exfiltrated USB from CIK_03D502E0

Reconnaissance phase also revealed some nice info. DNS records obtained from another victim showed mail.gorod-donetsk.org, pop.gorod-donetsk.org, which could suggest that the victim was part of DPR administration. 

From that same victim, those DNS records revealed connections against xn--j1ab.xn--b1adbccegehv4ahbyd6o2c.xn--p1ai (лк[.]лидерывозрождения[.]рф) translate Revival Leaders. That website was created “in behalf of Putin”, and is a contest to find potential leaders and fill out positions at Kherson, Zaporozhye, DPR and Lugansk. It is unclear which positions will be filled by that, but winners were promised to get 1.000.000 rubles for a personally chosen training program in the Russian Federation.

лк[.]лидерывозрождения[.]рф webpage photo

OTHER VICTIMS

In addition to the victims involved in the September referendums, we also identified two other victims that did not seem to be related to the elections. One of them appeared to be related to the transportation ministry or equivalent, codenamed by the attackers as ZhdDor, which could be translated as “railroad.” We also found additional data that suggested that the attackers could be interested in transportation.

Furthermore, we discovered that a library in Vinnitsya was infected in OP#5. Although this victim was UA-aligned, we do not understand why it was a target, especially since it was the only UA entity targeted in OP#5. However, it is worth noting that in OP#4, an entity located in Vinnitsya was also targeted.

EASTERN EGG

Finally, we have 2 victims named TstSCR and TstVM. It turns out that attackers, at some point, infected their own machines in order to carry out some testing, or by mistake.

Exfiltrated screenshot showing one of the attacker’s machine

This first image is a good example of that. First of all, we noticed that the keyboard language was set to ENG, which is unexpected. This may suggest that the group was composed of native English speakers. However, we find it strange because of the way they named the project folder (internet_WORK). We cannot be certain, but we believe that no native speaker would use that naming convention.

Exfiltrated screenshot showing one of the attacker’s machine while debugging Overall.exe

This second image is also nice to show. As you may notice, this is the source code of the file Overall.exe (reported by researchers), while being debugged. Also, some of the victim folders we named in this report are shown as part of the sources.

Exfiltrated screenshot showing one of the attacker’s machine. Some internal paths were shown in that screenshot.

For the account TstVM we choose this screenshot. In this case, attackers were developing a tool they use to tunnel victim communications. It can be seen (redacted) how source code reveals external IP addresses used by them, as some internal ones, naming for machines that we have not redacted and even passwords.

Analysis of these machines also revealed the usage of the application AdvOr, used for tunneling communications through TOR.

Attribution

In this case, attributing the attack to a specific country is not an easy task. Any of the involved countries or aligned groups could be responsible, as some victims were aligned with Russia, and others were aligned with Ukraine.

What is clear is that the principal motive of the attack was surveillance and data gathering. The attackers used different layers of protection, had an extensive toolset for their victims, and the attack was clearly targeted at specific entities. Perhaps in the future, further events or additional activity from the group can shed light on the matter.

Indicators of Compromise

OP#1

Type   SHA256
Host 91[.]234.33.185
LNK 41589c4e712690af11f6d12efc6cca2d584a53142782e5f2c677b4e980fae5bd
MSI C68ce59f73c3d5546d500a296922d955ccc57c82b16ce4bd245ca93de3e32366
DLL 9e73dacedf847410dd4a0caa6aac83d31f848768336514335d4872d0fde28202
DLL B6491d99d7193499a320bf6ad638146193af2ced6128afe8af3666a828f1b900
B2c2b232bc63c8feb22b689e44ce2fb5bf85f228fef665f2f1517e542e9906c6
A924dd46b6793ec82e1f32e3fb4215295e21c61eaafc7995cb08c20c5fbadc47

OP#2

Type   SHA256
Host 91[.]234.33.108
ZIP 301e819008e19b9803ad8b75ecede9ecfa5b11a3ecd8df0316914588b95371c8
LNK D956f2bf75d2fe9bf0d7c319b22a834976f1786b09ff1bba0d2e26c771b19ca2
DLL 9a6d4ac64fa6645c58a19b8c8795a8cb586b82f6a77aaf8f06eb83ba1f1390e8
2643B38BDAD89168BAEA4226DD6496B91ED283330B2C5D8CA134BEFA796E0F34
1FA2B3315FB2A12E65FD5258D1395597101F225E7BC204F672BCF253C82AEA55

OP#3

Type   SHA256
Host 185[.]230.90.163

OP#4

Type   SHA256
Host 45[.]154.116.147
Host 176[.]114.9.192
MSI 2ac977e6883405e68671d523eab41fe4162b0a20fac259b201ac460a691d3f79
PowerShell 78634be886ccb3949c8e5b8f0893cff32c474a466e4d4ceba35ba05c3d373bff
F7437b4b011e57394c264ed42bb46ad6f2c6899f9ca62f507bebbff29f2a3d3f
Dfc1e73685d3f11a3c64a50bb023532963807193169d185584f287aa8ce22a8b
EXE Ce9af73be2981c874b37b767873fa4d47219810e2672bf7e0b5af8c865448069
Fbe650223893284282e0be8f7719b554ff7a1d9fbbc72d3e17a47a9a1ceb6231
Dfa442780702863bf5c71af0c475743eef754743c3d0336ff8c5032a30f30dc0
12f16409b6191e3b2c5fd874cca5010711347d28900c108506dbc7f4d403c365

OP#5

Type   SHA256
Host 185[.]166.217.184
ZIP 961c52567232c1f98c04b1e605c34b0309ff280afe01e1a31384589e30eccf05
LNK Fb48b9102388620bb02d1a47297ba101f755632f9a421d09e9ab419cbeb65db8
MSI 9c16cf1f962bf736e3d6fb9ec3a37bb6f92c5f6cb1886d4332694ccc94735de8
VBS 78634be886ccb3949c8e5b8f0893cff32c474a466e4d4ceba35ba05c3d373bff
MSI 4808815cb03b5f31841c74755897b65ed03e56dbddbe0d1fed06af3710f32d51
ZIP 22bb73e97b01be2e11d741f3f4852380b3dae91d9ac511f33de8877a9e7c0534
LNK C75d905cd7826182505c15d39ebe952dca5b4c80fb62b8f7283fa09d7f51c815
F405a26904d2f6aaf4ff5f24dc345a24751d13b691a0bf17ba8c94f08ebb8b5b
Aa0e722832b1a039c96fd9ff169df8f48419f48e1dacf88633a5c561e6db0ba5
8aa19e3654f6c26b6c564a8103781174abc540384b20f645e87531c754814cf1
0e4b133fe7562fe5a65a8b7463f0c4f69d951f18d351cafe44e5cae393392057
EXE Bc93ef8e20f2a9a8799934d629fe494d5d82ea49e06ed8fb00ea6cc2e96f407e
EXE 82e4b4fddf5ea7b7c846d44bcc24d75edcec5726dfa5b81b9f43387a1fc1922a
332f6e99403841998f950ce2543b4a54c78aace2a2e1901b08917f63c7faa2f4
EXE 052309916380ef609cacb7bafbd71dc54b57f72910dca9e5f0419204dba3841d
EXE D6b5f48d4e94207a5a192c1784f9f121b59311bfd6a5e94be7c55b0108c4ed93
EXE 4a5f9f62ef8dfae47b164a4d46d242a19a11061284325e560df22b4da44bb97d
EXE 70801ef4f485ba4eb8a76da0d50fc53563d82fdf37951b421b3ae864a04ccd1c

Malwarebytes EDR and MDR remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Google brings app streaming to ChromeOS

0
[ad_1]

Companies are still working on better connecting your phone with your computer. Google just announced a new way to do this in a short blog post. According to the post, Google just introduced an app streaming feature for ChromeOS.

This feature is still in the beta testing stage, so it won’t be available to the general populace. You will need to be a ChromeOS beta tester in order to use it. Also, since it is in beta, you should expect some general bugginess and instability, as Google is still working on it.

Google is testing an app streaming feature for ChromeOS

The feature itself is pretty straightforward, but in order to use it, you have to have Phone Hub enabled. Also, your phone will need to be running Android 13 or later. The blog post points to Pixel phones no older than the Pixel 4a. Also, it points to the Xiaomi 12T, 12T Pro, 13, and 13 Pro. The compatibility will expand as the test progresses.

When you have this feature enabled, you’ll be able to interact with certain smartphone apps and functions right from your ChromeOS device. You won’t be able to completely control your device from your Chromebook. So, you won’t be running full apps, changing settings, or other things.

We’re not sure about the full extent of this feature just yet. It’s still in testing, and more functionality should arrive as time goes on. The blog post refers to you being able to check your rideshare status, update your shopping list, and reply to conversations.

Having limited functionality might work in this feature’s favor. This seems more like a feature to give you access to just a few of your most used smartphone features. If you’re working, then this will help you avoid having to stop and unlock your phone just to access your messages.

This could just be a way to avoid distractions. If you are on the beta version of ChromeOS, you can enable this feature now. Check out this help article if you need assistance enabling it.


[ad_2]
Source link

Google is integrating generative AI suggestions to Google Search

0
[ad_1]

Ever since Microsoft integrated ChatGPT into its Edge browser as the Bing AI chatbot, search engine giants like Google have been on their toes to develop a rival. At the Google annual I/O developer conference, Cathy Edwards, VP of engineering at Google, announced that the company would be integrating AI into its search engine, revolutionizing how users search for information online.

According to Google, the new AI Search will provide users with a summary of the pros and cons of any given topic, along with an AI-powered snapshot of key information to consider and links to further study on the topic. And if users tap on one of the suggested next steps, the new Search will take them to a new conversational mode where they can ask Google more about the topic they’re exploring, similar to the Bing AI chatbot.

For example, if a couple is looking for a vacation spot in Europe, the search engine will gather all the available information and provide a recommendation based on the advantages and disadvantages of each spot.

However, the new AI Search, which is not yet available to the public, will be accessible with a waitlist under a new experimental program called Search Labs. Users in the U.S. can join the waitlist today by tapping the Labs icon in the latest version of the Google app or Chrome desktop.

New AI Shopping Experience

Google will also offer a new AI shopping experience built on Google’s Shopping Graph, which will help users quickly connect with useful information online and make informed decisions when shopping for products. For example, if a user is searching for a new bicycle, the AI would give them a snapshot of noteworthy factors to consider and recommend bicycles based on their budget and preferences.

However, it is also worth noting that, like Microsoft’s Bing AI chatbot, the new AI Search will show ads in dedicated ad slots throughout the page. But, Google has ensured that these ads will be distinguishable from the organic search results.

Google search ai tools


[ad_2]
Source link

Sysco confirms data breach

0
[ad_1]

Food distribution company Sysco has confirmed that customer, business and employee data was stolen in a cyber attack it suffered earlier this year. 
The cyber attack is thought to have taken place on January 14, 2023 and was detected by Sysco on March 5.

According to BleepingComputer, Sysco said in an internal memo sent on May 3 that data from companies and suppliers located in the US and Canada as well as data from US employees may have been accessed during the cyber attack. The employee data accessed is believed to include name, social security number, account numbers and other personal information provided to Sysco for payroll purposes.

In data breach notices sent to those affected by the breach, Sysco said that the threat actor responsible for the cyber attack gained unauthorized access to its systems and “claimed to have acquired certain data”.

Sysco also disclosed the breach in a quarterly report filed with the US Securities and Exchange Commission on May 2, in which the company said the malicious actor “extracted certain company data, including data relating to operation of the business, customers, employees and personal data”.

An investigation into the breach is ongoing, with Sysco saying it has “begun the process of preparing to comply with its obligations with respect to the extracted data”. The food distribution company has also employed a cyber security firm to investigate the breach.

According to Sysco, its operations were not affected by the cyber attack and its networks are now secure as safeguarding measures to prevent further breaches. 


[ad_2]
Source link

New Discord username policy raises user privacy fears

0
[ad_1]

We take a look at the reaction to Discord’s proposed changes to how usernames work, and why many users aren’t happy with the upcoming alterations.

Discord, the Voice over IP (VoIP) and instant message communications tool, is changing how usernames function in a major way soon. Many users are not keen on this change at all.

What is going on over there, and why are so many people concerned about the upcoming alterations?

When Discord launched back in 2017, the developers didn’t want you to try and sign up only to be told “Username taken”. They wanted you to jump straight into the chatroom-based action. When people started wanting to talk to their friends located in other servers (essentially, another chat room) Discord introduced a friend system and a number system called “discriminators”.

This is just another way of saying “We put a four digit number at the end of your username”. If you wanted to be Steve, into the chat you’d go as Steve#3857. If another Steve signed up, they’d be Steve#3858. And so on. A drawback of this system is that if 9,999 Steves already exist, then we’re all out of Steves because this is the maximum number you can have of one particular username.

It remained like this for about 8 years, and now we’re at the point where everything is changing. Very soon, Discord will ask you to amend your username to something more specific. All of our Steves will fight to the death in order to become the one true Steve, shorn of numbers forever. If you miss out on landing the Steve handle, sorry: you’re probably going to be St3ve from now on.

This isn’t so bad, you may think. However, a lot of privacy related issues are bubbling up to the surface. Users of Discord quite enjoy the level of anonymity afforded by the numbers system. It’s a bit like having a giant online user directory, but one where the user is in full control of how that information leads back to them in the majority of situations.

With the numbers system in place, it’s as good as impossible for someone to track you down specifically inside of Discord. Where would you start? The answer, of course, is likely “From Steve#0001 all the way up to #9999″. Nobody is going to do this, and so users are afforded some degree of privacy as a result.

This is not to say using Discord keeps you 100% anonymous. Even so, someone usually has to tie a profile to something external and identifiable to run into trouble.

The new system means people have to make a choice. Secure a username that unambiguously ties to your online presence for as long as you use the service, or run the risk of impersonators grabbing your desired identifier.

Worse still, the way this is going to happen is that name availability will be done on a first come, first served basis with people who’ve been on the platform longer getting first choice. Lots of early adopters of the platform will no doubt have amassed many alternate accounts down the years. This not only gives them a distinct advantage in the “name yourself first” stakes, it also provides an opportunity for trolling or security threats. It would theoretically be straightforward to use an army of dormant accounts to “squat” usernames of famous people or business entities. From there, those accounts could be used for phishing or other scams. This isn’t a far-flung theory; you can read folks already raising this issue and thinking about the potential ramifications of Discord’s intended plan.

There are some additional wrinkles added to the new scheme. Users will be able to have a “non-unique display name” which is how your name will appear to other users. Users of social media will already be familiar with this approach. For example, your Twitter URL (here the equivalent of a Discord username) may be twitter(dot)com/Steve, but your display name might say Steven LotsOfNumbers.

The default for this display name when the changes kick in will be whatever your original Discord username happened to be. So, for a while, #Steve0001 will live on.

The sheer generic aspect of user accounts also helped relieve anxiety over phishing and compromise to some degree. Lost your account to a scammer? Assuming you haven’t spent a small fortune on premium features tied to your account, no big deal. Spin up a new one and #Steve0002 rides again.

Now that usernames will be very specific and tied to individuals, it’s not hard to imagine scammers increasing returns on stolen accounts. Streamers and other visible people in gaming circles lose their accounts all the time. What happens when Steven the Streamer, with three million YouTube subscribers, loses his account due to phishing?

Blackmail and potentially juicy returns for fraudsters, that’s what.

Discord has long been a home for entirely (and semi) anonymous folks to hang out in a stress free environment. It’s long since stopped being a hang out spot for gamers only. TV shows, films, products, and more may have a dedicated Discord space. I, myself, have used it for tech support from PC hardware suppliers.

In fact, it’s now so popular that it’s slowly tipping into the realm of unpopular where some user collectives are concerned. Old school forums, filled with search engine indexed solutions to obscure problems are being replaced by Discord, which cannot be indexed. Increasingly, more things are ending up in Discord which should be available elsewhere too. Video game mods, patch updates notes, and more are all drifting toward Discord. This is because it’s simple and easy to set up, and you don’t have to worry about maintaining a website or forum while chasing after security updates.

This tendency toward making information which would be better served existing outside of a chat room has been frustrating folks for a while now. Adding a username controversy on top of this may put some users off for good.

Tips for keeping your Discord account safe and private

If you’re a Discord user, here are some of the ways you can keep your account safe from scammers and other slices of fraud:

  • Beware Nitro offers. Nitro is a paid service which adds more features to Discord. “Free Nitro” messages in Discord channels from Bots, other users, and non Discord websites should be treated with caution. Check the official page for genuine offers.
  • Non-Discord theft: Scammers will target gamers with phishing links targeting gaming platforms such as Steam. As before, check official sites for word of special offers.
  • Don’t join the spam chain conga line: Bots are common in Discord channels, often there to help with admin tasks. Rogue bots will send direct messages and ask you to spam on its behalf, or invite you to a channel so it can send spam there. Don’t fall for it! 
  • Compromised server peril: If the admin is hijacked, any message sent in public or privately could be risky. Server admins should enable two-factor authentication on their accounts to minimise the risk.
  • Privacy settings: Current name policy changes aside, Discord offers several useful features including direct message filtering, explicit image filters, automatic spam filters, and granular control over who can add you as a friend.

Malwarebytes EDR and MDR remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Sony unveils Xperia 10 V with 6.1″ display, audio jack & more

0
[ad_1]

Sony announced two new smartphones during its press event today. We’ve already talked about the flagship Xperia 1 V, and are here to check out the Sony Xperia 10 V. This is Sony’s new mid-ranger, actually.

The Sony Xperia 10 V is a compelling mid-range phone in a compact body

If you don’t need the absolute best Sony has to offer, and want a more compact phone at the same time, well… this may be the device for you. The Xperia 10 V does resemble the Xperia 1 V from the design standpoint, to a degree, but its internals and size are different.

This phone has flattish sides, a flat display, and three cameras on the back. Those three cameras are vertically aligned, and inside a single camera island. Sony’s logo is included on the back, but it’s quite understated.

The device does not include a display camera hole, as Sony opted for thicker top and bottom bezels instead. A power/lock button on the device doubles as a fingerprint scanner, and this handset even included an audio jack. Sony also placed an audio jack on the Xperia 1 V.

A 6.1-inch display is included here, while 30W charging is also supported

Sony opted to include a 6.1-inch fullHD+ (2520 x 1080) OLED display on this device. We’re looking at a 21:9 aspect ratio here, while the Gorilla Glass Victus protects it. The Snapdragon 690 fuels the phone, and is paired with 8GB of LPDDR4X RAM and 128GB of UFS 2.1 flash storage. You can also expand that storage thanks to a microSD card (up to 1TB).

A 5,000mAh battery is also included here, and it supports 30W wired (USB PD) charging. Wireless charging is not supported. Android 13 comes pre-installed, while there are two nano SIM card slots here. Do note that you can opt to use the second SIM card slot for a SIM card, or a microSD card.

It has three cameras on the back, and the phone is water & dust resistant

A 48-megapixel main camera (f/1.8 aperture, 80-degree FoV, Hybrid OIS/EIS) is backed by an 8-megapixel ultrawide camera (120-degree FoV, f/2.2 aperture). An 8-megapixel telephoto camera (f/2.4 aperture, 10x hybrid zoom) also sits on the back. A single 8-megapixel camera (f/2.0 aperture, 1.12um pixel size, 78-degree FoV) is included on the front.

The Xperia 10 V is IP65/68 rated for water and dust resistance. Bluetooth 5.1 is supported here, while the device also offers 5G connectivity. Stereo recording is supported too, and stereo speakers included.

The phone measures 155 x 68 x 8.3mm, while it weighs 158 grams. The Xperia 10 V comes in Black, Lavender, Sage Green, and White color options. It’s priced at €449 / £399, and it will become available in Europe, the UK, and a few other countries from mid-June.


[ad_2]
Source link

Apple is launching Final Cut Pro and Logic Pro on iPad

0
[ad_1]

It’s no secret that over the past few years, Apple has marketed its iPad Pro devices as a tool that can replace laptops for professionals and creators alike. However, the lack of professional apps, including Apple’s video editing suite, i.e. Final Cut Pro, has refrained many creators from switching to an iPad-only workflow. Now, in an effort to address this issue, Apple is finally bringing Final Cut Pro and Logic Pro to the iPad, which will be available to download from the App Store at a monthly subscription of $4.99 or an annual subscription of $49.

Enhancements to the Final Cut Pro and Logic Pro for iPad

Apple says its new touch-first interface for the apps and intuitive tools allows creators to unleash their creativity in even more places than before. One of the most exciting features is the new jog wheel, which allows users to navigate the Magnetic Timeline, move clips, and make fast frame-accurate edits with just a tap of a finger. Additionally, the new Line Drawing tool enables users to draw and write directly on top of video content using their Apple Pencil. Similarly, the Apple Pencil hover feature lets users skim through preview footage without ever touching the screen.

Meanwhile, Logic Pro for iPad comes with several enhancements as well, such as Multi-Touch Gestures. These gestures let music creators play software instruments and interact with controls naturally, as well as help them navigate complex projects with pinch-to-zoom and swipe-to-scroll gestures.

Additionally, the Logic Pro app for iPad comes with a new sound browser that uses dynamic filtering to help users discover different types of sounds. The app also debuts a new Beat Breaker plug-in that allows users to manipulate the timing and pitch of their sounds with ease by simply swiping and pinching. Moreover, users will also be able to move Logic Pro projects between the app on Mac and iPad.

One month free trial

Apple’s decision to bring Final Cut Pro and Logic Pro to the iPad will enable content creators to switch to an iPad-only ecosystem and take full advantage of their Magic Keyboard or Smart Keyboard Folio to enter keyboard commands. Moreover, Apple is also offering a one-month free trial for users to explore the apps’ features and see if they work for them.

“We’re excited to introduce Final Cut Pro and Logic Pro for iPad, allowing creators to unleash their creativity in new ways and in even more places. With a powerful set of intuitive tools designed for the portability, performance, and touch-first interface of iPad, Final Cut Pro and Logic Pro deliver the ultimate mobile studio,” said Bob Borchers, Apple’s vice president of Worldwide Product Marketing.


[ad_2]
Source link