Cado Security has uncovered a new malware family, named CoinStomp, which is targeting Asian cloud services providers to mine cryptocurrency. The firm’s researchers have found that the overall purpose of CoinStomp is to quietly compromise instances in order to harness computing power to illicit mine for cryptocurrency. Hijacking computers to mine for cryptocurrency has become a “thing” with various threat actors in recent years.
Saryu Nayyar, CEO and Founder, Gurucul had this to say:
“Unfortunately, these types of attack campaigns are most successful when spreading their efforts across multi-cloud environments as most XDR and traditional SIEM solutions, while multi-cloud enabled or supported, cannot correlate and perform advanced analytics across multi-cloud environments. In addition, and an understanding of access entitlements to specific applications, user and entity behavioral baselining combined with self-learning out-of-the-box machine learning models can be extremely effective at escalating the impact of the threat activity that may be difficult to detect otherwise. We can see as part of this attack that access privilege violations can have a major impact on its success. This is extremely challenging for most current threat detection and response solutions to automatically detect and often requires a lot of manual analyst investigation to determine. However, there are a small subset of next generation SIEM vendors that are capable of employing some of the security capabilities outlined here.”
Cryptocurrency miners can sometimes be very hard to detect. But the video below might be of assistance in at least getting an idea as to if you might have this sort of malware running around in your environment.
RatMilad Android Malware Targets Middle East Users In New Campaign
Posted in Commentary with tags malware on October 7, 2022 by itnerdZimperium released a blog post on Wednesday that details a novel Android malware called RatMilad which is targeting Middle Eastern enterprise mobile devices by concealing itself as a VPN and phone number spoofing app:
The original variant of RatMilad hid behind a VPN, and phone number spoofing app called Text Me with the premise of enabling a user to verify a social media account through a phone, a common technique used by social media users in countries where access might be restricted, or that might want a second, verified account. Armed with the information about the spyware, the zLabs team has recently discovered a live sample of the RatMilad malware family hiding behind and distributed through NumRent, a renamed and graphically updated version of Text Me.
The phone spoofing app is distributed through links on social media and communication tools, encouraging them to sideload the fake toolset and enable significant permissions on the device. But in reality, after the user enables the app to access multiple services, the novel RatMilad spyware is installed by sideloading, enabling the malicious actor behind this instance to collect and control aspects of the mobile endpoint. As seen in the demo installation video below, the user is asked to allow almost complete access to the device, with requests to view contacts, phone call logs, device location, media and files, as well as send and view SMS messages and phone calls.
Clearly the threat actor or actors behind this are sophisticated. Which makes them very dangerous.
Dale Waterman, who is based in Dubai and is the Managing Director at Breakwater Solutions for the Middle East, noted:
“The fact that this version of the RatMilad malware is targeting mobile phone users in the Middle East with Android operating systems by hiding behind a fake VPN comes as no surprise. Cybercriminals are using trusted platforms like Telegram and WhatsApp to distribute download links to the spyware because they recognize that many governments in the region do not permit the call functionality of apps like WhatsApp. Residents are able to use messaging, but not the (free) call services. If you consider the number of expats living and working across the Middle East, with many away from immediate family and loved ones, then it becomes obvious why bad actors would use a VPN scam to socially engineer access to devices. This is compounded by fact that GDPR-like privacy laws are only now being implemented across the Middle East, but not actively enforced yet by most data protection authorities. Consumers in the region are therefore completely de-sensitized to being constantly bombarded with unsolicited marketing and offers. This reduces the likelihood of consumers questioning the origin of the messages.”
This just highlights that you have to have your head on the metaphorical swivel when it comes to threats as this one is distributed via platforms that are trusted by many.
Leave a comment »