Ransomware review: May 2023

0
[ad_1]

LockBit maintained its position as the top ransomware attacker and was also observed expanding into the Mac space.

This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In this report, “known attacks” are those where the victim didn’t pay a ransom. This provides the best overall picture of ransomware activity, but the true number of attacks is far higher.

In April, LockBit maintained its position as the top ransomware attacker and was also observed expanding into the Mac space. Meanwhile, Cl0p, which dramatically expanded its attack operations in March, has gone quiet this month, despite Microsoft observing them exploiting PaperCut vulnerabilities.

LockBit’s macOS ransomware is an interesting development in the threat landscape, showing that the group is dipping its toes into the historically ransomware-free Mac environment. The variant, targeting macOS arm64 architecture, first appeared on VirusTotal in November and December 2022 but went unnoticed until late April when it was discovered by MalwareHunterTeam. 

The LockBit macOS samples analyzed by Malwarebytes seem ineffective due to being unsigned, not accounting for TCC/SIP restrictions, and being riddled with bugs, like buffer overflows, causing premature termination when executed on macOS.

“The LockBit encryptor doesn’t look particularly viable in its current form, but I’m definitely going to be keeping an eye on it,” says Thomas Reed, director of Mac and mobile platforms at Malwarebytes. “The viability may improve in the future. Or it may not, if their tests aren’t promising.”

Keep an eye out, because LockBit’s work in developing a macOS ransomware variant—plagued though it may currently be—could signal a trend toward more Mac-targeting ransomware in the future.

Known ransomware attacks by gang, April 2023
Known ransomware attacks by gang, April 2023
Known ransomware attacks by country, April 2023
Known ransomware attacks by country, April 2023
Known ransomware attacks by industry sector, April 2023
Known ransomware attacks by industry sector, April 2023

Cl0p ransomware, which gained prominence in March by exploiting a zero-day vulnerability in GoAnywhere MFT, went comparatively silent with just four attacks in April. Nevertheless, the gang was seen last month exploiting vulnerabilities in PaperCut servers to steal corporate data. 

PaperCut is a popular printing management software which was targeted by both Cl0p and LockBit in April using two gnarly vulnerabilities: one allowing remote code execution (CVE-2023-27350) and the other enabling information disclosure (CVE-2023-27351). Once gaining initial access, Cl0p members sneakily deploy the TrueBot malware and a Cobalt Strike beacon to creep through the network, grabbing data along the way. 

Cl0p clearly has a history of exploiting platforms like Accellion FTA and GoAnywhere MFT, and now they’ve set their sights on PaperCut. So, if you’re using PaperCut MF or NG, upgrade pronto and patch these two vulnerabilities!

Vice Society, notorious for targeting the education sector, has recently advanced their operations by adopting a sneaky PowerShell script for automated data theft. Discovered by Palo Alto Networks Unit 42, the new data exfiltration tool cleverly employs “living off the land” (LOTL) techniques to avoid detection. For instance, the script employs system-native cmdlets to search and exfiltrate data, minimizing its footprint and maintaining a low profile.

Separately, the Play ransomware group has whipped up two fancy .NET tools, Grixba and VSS Copying Tool, to make their cyberattacks more effective.

Grixba checks for antivirus programs, EDR suites, backup tools to help them plan the next steps of the attack. VSS Copying Tool, meanwhile, tiptoes around the Windows Volume Shadow Copy Service (VSS) to steal files from system snapshots and backup copies. Both tools were cooked up with the Costura .NET development tool for easy deployment on their victims’ systems.

As Vice Society, Play, and other ransomware groups increasingly adopt advanced LOTL methods and sophisticated tools like Grixba, the capacity to proactively identify both malicious tools and the malicious use of legitimate tools within a network will undoubtedly become the deciding factor in an organization’s defense strategy moving forward.

As for other trends, the USA still tops the charts as the most affected country, with the services industry getting the brunt of the attacks, as both have been the case all year. The education sector has its highest number of attackers (21) since January. Meanwhile, the healthcare sector saw a huge surge in attacks (37) in April, the highest it’s been all year.

New players

Akira

Akira is a fresh ransomware hitting enterprises globally since March 2023, having already published in April the data of nine companies across different sectors like education, finance, and manufacturing. When executed, the ransomware deletes Windows Shadow Volume Copies, encrypts files with specific extensions, and appends the .akira extension to the encrypted files.

Like most ransomware gangs these days, the Akira gang steals corporate data before encrypting files for the purposes of double-extortion. So far, the leaked info published on their leak site—which looks retro and lets you navigate with typed commands—ranges from 5.9 GB to a whopping 259 GB.

Akira demands ransoms from $200,000 to millions of dollars, and it seems they are willing to lower ransom demands for companies that only want to prevent the leaking of stolen data without needing a decryptor.

CrossLock

CrossLock is a new ransomware strain using the Go programming language, which makes it more difficult to reverse engineer and boosts its compatibility across platforms. 

The ransomware employs tactics to avoid analysis, such as looking for the WINE environment (to determine if their ransomware is being executed within an analysis or sandbox environment) and tweaking Event Tracing for Windows (ETW) functions (to disrupt the flow of information that security tools and analysts rely on to identify suspicious behavior).

In April, the CrossLock Ransomware Group said they targeted Valid Certificadora, a Brazilian IT & ITES company.

Trigona

Trigona ransomware emerged in October 2022 and has targeted various sectors worldwide, including six in April. Operators use tools like NetScan, Splashtop, and Mimikatz to gain access, perform reconnaissance, and gather sensitive information from target systems. They also employ batch scripts to create new user accounts, disable security features, and cover their tracks. 

Dunghill Leak

Dunghill Leak is a new ransomware that evolved from the Dark Angels ransomware, which itself came from Babuk ransomware. In April it published the data of two companies, including Incredible Technologies, an American developer and manufacturer of coin-operated video games. The Dunghill Leak gang claims they have access to 500 GB of the company’s data, including game files and tax payment reports. Researchers think Dunghill Leak is just a rebranded Dark Angels.

Money Message

Money Message is a new ransomware which targets both Windows and Linux systems. In April, criminals used Money Message to hit at least 10 victims, mostly in the US and from various industries. The gang also targeted some big-time companies worth billions of dollars, such as Taiwanese PC parts maker MSI (Micro-Star International).

Money Message uses advanced encryption techniques and leaves a ransom note called “money_message.log.” 

Our Ransomware Emergency Kit contains the information you need to defend against ransomware-as-a-service (RaaS) gangs.

How to avoid ransomware

  • Block common forms of entry. Create a plan for patching vulnerabilities in internet-facing systems quickly; and disable or harden remote access like RDP and VPNs.
  • Prevent intrusions. Stop threats early before they can even infiltrate or infect your endpoints. Use endpoint security software that can prevent exploits and malware used to deliver ransomware.
  • Detect intrusions. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.
  • Stop malicious encryption. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.
  • Create offsite, offline backups. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.
  • Don’t get attacked twice. Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.

Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Google’s Nearby Share for Windows PCs goes global

0
[ad_1]

Over the weekend it was discovered that Google is expanding the support for its Nearby Share feature to Windows PCs on a global scale. The feature was already available to Android users with a Windows desktop or laptop in the US and a few other countries. Having been launched in early April in beta.

Now it looks like more countries from around the world will have access. A recent report from 9To5Google on May 6 points out that Google has added information to the support page for this feature regarding regional availability.

The support page now reads that Nearby Share is “available in the US and most countries globally.” It’s the “most countries globally” part that’s worth paying attention to. As this confirms the feature is now available pretty widely. This includes many countries in Europe and Asia, as well as parts of Africa and South America. Basically, just about any country where Android and Windows devices are available it seems.

Google doesn’t appear to give a definitive list, but it does mention that it’s still not available in Cuba, Iran, Syria, or North Korea. Which are all countries with sanctions.

Nearby Share gets global expansion

If you’ve got a Windows PC and an Android device, it might be worth checking this app out. Its main goal is to provide users with convenience. With Nearby Share, you can share files between your Windows PC and Android device wirelessly. This includes images, videos, documents, and more. So long as the two devices are close together as the name suggests.

Since the feature is still in beta there’s also a chance that you may run into bugs. It’s worth keeping in mind as many assume a release is a release, and therefore should be no bugs at all. This doesn’t mean you’ll run into any bugs of course. But it’s best to be aware of any that could potentially pop up. You can grab the beta PC app from the button below.

Nearby Share Beta


[ad_2]
Source link

AI-powered Google Messages Magic Compose is here

0
[ad_1]

If you are tired of composing texts while chatting with friends, the Google Message Magic Compose is here for you. This new artificial intelligence-powered feature can do a lot more than just compose those text messages for you. It can also help you to spice up your chatting experience with family and friends.

Beta testers have already gained access to this feature ahead of its global release. This feature marks a new era in the use of artificial intelligence technology on a day-to-day basis. Over the past few months, netizens have had a taste of various artificial intelligence models.

Now it is time to let artificial intelligence do the chatting for you while you chill and enjoy the conversation. This article will cover all the details regarding this new feature that is coming to the Google Messages app. For Google, this is a new era for chatting and artificial intelligence is already playing a big role.

Details regarding the Google Message Magic Compose feature

Google Message beta testers are already making use of an artificial intelligence text composer feature. From the images sent to the sources of this information, it is clear that the name of this feature is Magic Compose and its function is very simple. Once activated, it helps generate automatic responses for users based on their conversation with the person they wish to reply to.

To better understand this feature, think a bit about the Gboard (Google keyboard) on your Android device. While typing, the keyboard helps generate the next word for your sentence. It does this by understanding your previous typing pattern and how it feels the sentence should go.

Just like Gboard, the Magic Compose feature will pick a ton of options on what your response to a chat should be. Activating this feature will let users pick the response they feel is best from the list of suggestions. To activate this feature, users will need to head over to the suggestion page under settings and toggle on the Magic Compose slider.

For now, not everyone has access to this feature as it is still in its experimental stage. There is some spice to stand this feature apart from the Smart Reply feature Google Messages already offers. The generated replies with Google Message Magic Compose come in several sections for users to pick from.

There are up to five sections, being chill, excited, lyrical, formal, and short. All sections can be put to use while chatting with friends and acquaintances, but formal is best while talking with a colleague, an employer, an employee, or even a client. The lyrical section stands out as Google picks song lyrics that can best reply to the message sent to the user.

Surprisingly, this feature is not limited to RCS messaging and can be used over MMS chats. The coming months will shed more light on this Google Message Magic Compose feature that might be rolling out globally. Do you think artificial intelligence has a role to play in chats between family and friends?


[ad_2]
Source link

Google Photos app will soon get a proper photo editing layout optimized for tablets

0
[ad_1]

Google Photos is an incredible app for Android users that want a way to easily access their photo library from wherever they are, while also having a basic – but powerful – set of tools to edit photos and videos from their phones. Unfortunately, the way the Google Photos app works right now on tablets, and in landscape mode, is not ideal as it is just a stretched out version of the phone app.

Thankfully, according to a report on the Google News Telegram channel, this will be changing soon as a new layout has been spotted that will make Google Photos look very similar to other photo editing apps when in editing mode. Instead of all the editing tools being listed at the bottom, the new tablet interface will instead show the tools on a side panel.
The tools themselves don’t appear to be changing, since as you can see in the images below, it includes the familiar enhance, crop, rotate, magic eraser, and color adjustments. However, the convenient re-positioning makes it easier to navigate and zoom in and out of your picture as needed on the left, while still keeping the tools you are working with on the right.

 

As mentioned by the source, this new layout has yet to roll out to the masses and is only visible in the latest version of the Google Photos app after enabling it. It is also not applicable in portrait mode, which appears to be unaffected by this change.

The new tablet editing interface is a welcome addition for users who edit their photos on tablets, as it provides a more streamlined and user-friendly experience. With the new layout, users can easily edit their photos on their tablet and share them with friends and family.


[ad_2]
Source link

Galaxy Watch will tell you if it detects irregular heart rhythms

0
[ad_1]

Today Samsung has announced that the FDA has cleared the irregular heart rhythm notification for Galaxy Watch. This means that your Galaxy Watch device will eventually be able to tell you if it detects this event. Armed with the knowledge of an irregular heart rhythm detection, users can then activate the ECG function on their watch to gather a more accurate reading.

The feature is designed to notify a user if it detects signs of atrial fibrillation, which is a type of arrhythmia. The reason for this feature addition is because AFib is considered an indicator of other potentially more serious heart issues. So in the spirit of heart health, and overall health and wellness, it makes for a natural next step in Samsung’s mission to make the Galaxy Watch platform one for those who want to be more conscious about their health.

The addition of the IHRN feature for Galaxy Watch users brings a more complete set of health monitoring tools to the platform. Users can already use the Galaxy Watch 5 to take ECG measurements. The watch also has an HR Alert function. Which is intended to alert users of abnormally low or high heart rates.

Irregular heart rhythm detection will come to Galaxy Watch 4 and 5

There’s good news and bad news here. Samsung confirms this feature will come to the Galaxy Watch 4 and the Galaxy Watch 5 series of devices. But not till later. The IHRN feature will be part of the new One UI 5 Watch update rolling out later this year. Which is coming to the new Galaxy Watch devices coming later in 2023 before Samsung’s currently available watches.

That leaves a little uncertainty as to when the feature will be available for those with current devices. Samsung also notes that availability may vary by market. So the feature may not be available everywhere.


[ad_2]
Source link

Bard AI on Pixel devices might become a thing with a new update

0
[ad_1]

According to reliable sources, Google might be working on slapping Bard AI on Pixel devices. Note that the previous sentence didn’t state ‘Android devices’ as Google might only roll out this feature to its smartphones. This information came after some developers decompiled the most recent version of a new Play Store application.

Very little information is available concerning the Play Store application that reveals this feature. But, the developers make it clear that Google uploaded this application by itself. This proves that the Mountain View tech company is taking its AI integration moves more seriously.

Google intends to make Pixel users more familiar with the Bard AI model. Users might soon rely on Bard for carrying out certain tasks on their Pixel device. Possibly, this will be like asking Google Assistant to perform certain tasks for you, but let’s take a look at the available information.

Bard AI on Pixel devices may make its way to the device’s home screen

The folks at 9to5Google have been able to spot some lines of code that show off this feature. Bard AI on Pixel devices might become available as a widget on the home screen. This will make it more accessible to users and it’d come with a bunch of features that some users might find quite interesting.

Some of these features might include text generation in Gmail, Google Docs, and other similar Google apps. There is no proof that this feature will launch, as its fate still hangs in the balance. Google might still kill this Bard AI home screen feature, hence not rolling it out to users.

Currently, users can access Bard AI and use some of its features via the dedicated website. Bringing the artificial intelligence feature to Pixel devices will make users more familiar with it. This will help increase the rate of interaction between Pixel users and Bard AI.

During the coming Google I/O, netizens will get to know more about this AI feature. It isn’t clear whether this Bard AI on Pixel devices feature will come as an app or a web integration. Some netizens also express hope that it gets integrated into the Google Assistant feature on Pixel devices.

Google will give more information about its integration of Bard AI on Pixel devices. In just a few weeks, Pixel users will know whether to expect Bard AI on their devices. This might add some flavor to the current competition in the artificial intelligence industry.


[ad_2]
Source link

Twitter Flaw Exposes Private Circle Tweets to Public

0
[ad_1]
Twitter Flaw Exposes Tweets

According to reports, there has been a security incident with Twitter’s Private Circle tweets feature as they have been exposed publicly.

Twitter’s Private Circle was a feature introduced by Twitter in 2022, in which users can send their tweets to a particular set of people (maximum of 150 members) which keeps their tweets within the close circle away from the public.

In Twitter’s help center, a question was answered, “Who can see my Twitter circle tweets?”. The answer to this question, as mentioned by Twitter, was, “People who are currently in your Twitter Circle can see any Twitter Circle Tweets you’ve shared as well as any non-protected replies to those Tweets. If a circle member keeps a protected account, only the followers in your Twitter Circle can see their replies.

Your friend’s Twitter Circle will not be able to see any part of the conversation unless your circles share common members.”

However, a tweet that resurfaced nearly a month after from a Twitter user SL (@slbad_) denotes that private tweets were being exposed to the public and the Twitter circles feature was facing a bug.

Following this, Twitter contacted every user and mentioned that there had been a ‘security incident’ on the display of private circle tweets.

In the security incident notification from Twitter, they mentioned, 

“We’re contacting you because your Twitter account may have been potentially impacted by a security incident that occurred earlier this year (April 2023)”. 

In April 2023, a security incident may have allowed users outside your Twitter Circle to see tweets that should have been limited to the Circle you were posting. Our security team identified this issue and immediately fixed it so these tweets were no longer visible outside your Circle. 

We’ve conducted a thorough investigation to understand how this occurred and have addressed this issue. Twitter is committed to protecting the privacy of the people who use our service, and we understand the risks that an incident like this can introduce and deeply regret this happened.”

Ever since the takeover of Twitter by Elon Musk, there have been several changes and issues going on with Twitter and its users. Adding to them, the exposed private circle tweets have also affected the platform. 

However, this issue came to light after Musk made an algorithm recommendation change on Twitter last month. He mentioned that the algorithm will be updated every 24 to 48 hours.

Twitter has been working on resolving this and several other issues they have been facing recently.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus


[ad_2]
Source link

Arc launches Pulse bumper case for Galaxy S23 Ultra & S22 Ultra

0
[ad_1]

Mobile accessory maker Arc has started taking pre-orders for its Pulse bumper case for Samsung‘s Galaxy S23 Ultra and Galaxy S22 Ultra. The firm is offering three styles of its unique two-piece aluminum bumpers for the two Samsung flagships. It will start shipping pre-orders in the second week of June.

Arc’s Pulse bumper case is an unusual protective cover for phones. It leaves most parts of the phone uncovered but offers a decent level of protection. It’s a two-piece accessory, one each for the top and bottom edge. The upper piece extends back to the device’s rear camera array.

The aluminum pieces wrap around the edges such that the phones have elevated corners both at the front and back. These elevations don’t allow the screen or the rear glass to slam hard on the surface during falls. Camera glasses also stay protected.

Arc launches its Pulse bumper case for the latest Galaxy flagships

Arc first launched this bumper case for the iPhone 12 in 2020. The company followed up with similar solutions for the iPhone 13 and iPhone 14 as well. However, it never made the case for any Android device. The Galaxy S23 Ultra and the Galaxy S22 Ultra are the first two non-iPhone models to get this unique case from Arc. The case design is slightly different from what we’ve seen for iPhones in the past.

First spotted by 9to5toys, the company is offering the Pulse bumper case for these two Samsung phones in three styles. We have a matte black solution priced at $59. The Mirror Polish Silver version costs $89, while a similar solution with a golden polish is priced at $119.

Arc lets you match the case with the color of your phone to see which fits the best. It has listed all eight colors of the Galaxy S23 Ultra, four of which are only available through Samsung’s online shop. Likewise, it has listed all six colors of the Galaxy S22 Ultra as well.

As said earlier, Arc has already started taking pre-orders for its Pulse bumper case for the two Galaxies. The company plans to start shipping units in the second week of next month, between June 12 and June 16.

It is offering free shipping in the US for orders over $79 and in Canada for orders over CA$99. If you’re interested in this unique case for your Galaxy S23 Ultra, you can check it out here. Galaxy S22 Ultra users go here.


[ad_2]
Source link

FluHorse malware is stealing sensitive data from Android users

0
[ad_1]

Over the past few years, malware attacks on iOS and Android have become rampant, with threat actors constantly finding new ways to infiltrate our systems. Now, according to a report from Check Point Research (CPR), threat actors are using a new strain of malware called FluHorse to target Android users and steal sensitive information such as credit card data, passwords, and two-factor authentication codes.

The malware, which is primarily targeting users in East Asia, sends emails to high-profile individuals which prompt them to resolve a payment issue. However, the email contains a link that takes users to fake websites of legitimate apps, where the threat actors encourage them to install the fake app APK.

Once installed, the app requests SMS access to intercept the incoming 2FA codes and prompts the users to enter their login credentials and credit card information to resolve the payment issue. The app then displays a “system is busy” message for 10 minutes, during which it gathers sensitive information and transmits it to the attackers. Since the apps closely mimic the appearance of legitimate apps, many users fail to notice the limited functionality and malicious behavior.

The malware campaign, which has been active since last year, is targeting apps such as ETC, a toll-collection app used in Taiwan, VPBank Neo, a banking app in Vietnam, and an unnamed transportation app.

Warning to Android users

While threat actors are currently targeting users in East Asia, CheckPoint researchers have warned that the campaign could also spread to Western countries. And, since threat actors are constantly developing new FluHorse-infected apps, Android users should be cautious when receiving emails that urge them to take immediate action, as these emails may contain malware.

Moreover, to ensure best practice, users should never download apps or files from third-party websites or links provided in emails, regularly update their devices to the latest security patch, enable 2FA, and install trustworthy antivirus software.

attack chain


[ad_2]
Source link

Google Weather app for Android is getting a Material You redesign

0
[ad_1]
The current weather app offered by Google is brighter and more colorful than most data-heavy weather apps. And Google Weather also gives you weather forecasts as far as 10 days in advance. But perhaps the thing that the Google Weather app is known for the most is the cute illustration that stars a frog on most of the page when you have the app on the “Today” tab.
On the “Tomorrow” tab, you see a graph with the hourly temperature over the 24 hours from 7 am the next day to 7 am the following day. There is additional data showing precipitation and wind forecasts over the same period. The final tab, as we mentioned, shows the forecast for the next 10 days.
But with the upcoming Material You redesign, which 9to5 Google says was tweeted by an undisclosed Googler today, the tabs are gone and all of the data is placed on a single page that shows the hourly forecast and the 10-day forecast. Se we would assume (which usually is a potentially lethal endeavor) that the rest of the data that normally would show up under the “Tomorrow” tab can be viewed by scrolling down on the page.

The cute illustration still appears, but it only takes up a small amount of the real estate right below the current temperature, current weather conditions, and the day’s high and low temperatures. In a way, it makes the Google Weather app look a little like the dime-a-dozen weather apps available from the Play Store.

Now I have a habit of collecting weather apps like Pokemon cards although, to be honest, when I want to know the current conditions and latest forecast, I usually stick with the big names like The Weather Channel (iOS, Android) and AccuWeather (iOS, Android). Still, you might like to have a 10-day forecast to glance at, especially now that the warm weather is beginning to show up. The Google Weather app is available for Android users and can be downloaded from the Google Play Store by tapping on this link.

When the new Material You version of the Google Weather app will be disseminated is unknown, but as soon as it does appear, we will update this story.


[ad_2]
Source link