Purple AI | Empowering Cybersecurity Analysts with AI-Driven Threat Hunting, Analysis & Response

SentinelOne is delighted to introduce Purple AI, a generative AI dedicated to threat-hunting, analysis and response. Purple AI uses a variety of models both open source and proprietary and aims to increase the organization’s efficiency by arming security analysts with an AI engine that can help identify, analyze and mitigate threats using conversational prompts and interactive dialog.

In this post, we explain how Purple AI will drive SOC team efficiency and efficacy in threat hunting, analysis and response and illustrate this powerful new feature with example use cases.

Threat Hunting Made Simple with Conversational AI

When it comes to threat hunting, building the right query to get effective results is not an easy task. It requires the analyst to understand what patterns to look for and be familiar with the query syntax at hand in order to translate a seemingly simple question into something the system can understand.

With Purple AI, analysts can now get rapid, accurate and detailed responses to any question, in any language, that otherwise would have required hours of research and multiple queries – not to mention years of analyst experience – to obtain an answer.

The Known Knowns

Purple AI allows threat hunters to ask questions about specific, known threats and get fast answers without needing to create manual queries around indicators of compromise.

For example, the analyst could use a prompt such as “Is my environment infected with SmoothOperator?”, or “Do I have any indicators of SmoothOperator on my endpoints?” to hunt for a specific named threat.

In response, Purple AI delivers a table of results along with context-aware insights based on the observed behavior and identified anomalies within the returned data. Suggested follow up questions and best next actions are also provided. In the case of the SmoothOperator example, a hunter might, for instance, receive the following summary:

Analysis of results shows that there are three endpoints with the SmoothOperator malware detected, all from the same company site. The data shows that the malware has infected both desktop and server endpoints. This indicates that there may be a larger-scale attack underway, and it is important to investigate further to determine the extent of the infection.

The data shows that the malware has been detected multiple times on some of the infected devices. For example, the malware has been detected twenty two times on the endpoint named “TheEnterprise”, where it was last observed a few hours ago. This suggests that the malware is persistent and that it has been active on the infected devices for some time.”

The hunter can then follow up with additional questions suggested by Purple or manually typed by the user, such as:

“Have there been any persistent events on the endpoint ‘TheEnterprise’?”

“Are there any known vulnerabilities on the affected machines?”

“Show me the users that are active on the affected machines, check their Okta data for successful logins and include the location where the logon happened.”

The system will then automatically return results, alongside a summary of the identified behavior and recommend the next best investigation questions and response actions.

In the examples above, the final question might have resulted in a suggestion to trigger one or more of a combination of actions like “clear user session”, “suspend user`s Okta account”, “force Password reset”, “network quarantine all affected endpoints”, “create a rule to notify users on similar activity identified on other endpoints”, “collect recent security logs from affected machines” and more.

With a single click of a button the analyst can then trigger one or multiple actions, while continuing the conversation and analysis with Purple.

Purple runs on every piece of information within the SentinelOne Security DataLake and enables one-click response via the various SentinelOne XDR integrations. Every question asked by the analyst is executed against the right source or a combination of sources behind the scenes, without the user needing to be familiar with the various data sources or the way their data is ingested. For instance, analysts may ask:

“Are there any ec2 instances running xmrig?”

“Are there any disconnected linux machines of type server or any kubernetes node in my network?”

The analyst can then trigger E/XDR actions like the following:

“Scan all affected EC2 instances, to confirm that no residual artifacts remain on any of the instances that were involved in the incident.”

Or

“Add the detected coinminer software to the SentinelOne Blocklist, preventing it from being re-downloaded, or running on any other endpoints.”

The Unknown Unknowns

In other cases, however, threat hunters may not know what they are looking for. By leveraging the capabilities and speed of Purple AI to intelligently utilize internal and external resources, users can ask questions about suspicious activity they may have not been able to define themselves.

For instance, they might ask Purple AI to:

“Search for all instances of processes attempting to access sensitive data or files and investigate the source of these access attempts”

Or

“Search for all command-line tools commonly used by attackers and investigate if they are being used in suspicious ways.”

Analysts can also leverage Purple to ask questions like “how can I identify X”? For instance:

“How do I look for a possible webshell?”

Or

“How can I search for LOLBins?”

The above might seem simple, but without Purple AI, the task of translating vague terms like “sensitive data”, “commonly used” or “suspicious way” into patterns and then syntax of a query language that could return useful results is an extremely challenging  task.

Threat Analysis Made Simple

It is well-known that alert fatigue is one of the biggest challenges facing the modern security operations center (SOC). Most security teams receive more security alerts than they can possibly investigate and address. The issue is clear: the security problem is a data problem. Information only becomes knowledge once we apply meaningful linkages between multiple points of information, assembling the contextualized data into actionable results.

Purple AI, on top of its ability to help security teams ask complex threat hunting questions and run operational commands to manage the entire enterprise environment using natural language, also significantly simplifies the threat investigation process.

Purple’s understanding of ingested data as well as the cyber security domain allows it to quickly determine the chain of events and then to summarize a potentially complex situation to the analyst. The powerful combination of SentinelOne’s patented Storylines technology and Purple AI allows analysts to not only quickly find all events associated with a given activity but also get a summary of these events and their suspicion level in no time.

Within seconds, Purple will provide insights on the identified behavior alongside recommendations, thus reducing the need to manually analyze and stitch together diverse events into one contextual story. This vastly improves analysts’ efficiency, allowing them to investigate and triage a far greater number of alerts in significantly less time.

Purple AI In Action

Below is an example summary created for a threat identified by the SentinelOne Singularity platform.

Analysis of this event suggests that a potentially malicious activity occurred on the endpoint named “TheBorg” running on a Windows server in the SF East Bay Corp site. The suspicious activity was initiated by the “ResistanceIsFutile.exe” process, which is unsigned and located on the user’s desktop. This process started another process, “powershell.exe”, which is signed by Microsoft Windows and located in the SysWOW64 folder.

Notice that Purple AI first indicates whether any malicious activity had been seen and where. This is important for the analyst to understand how widespread the attack is. In this example, all malicious activity had been identified on a single site. The user can then choose to drill down further to get detailed analysis of the identified activity if required.

Purple next provides detailed analysis of the events, indicating the behaviors that made SentinelOne classify the behavior as malicious.

The PowerShell process executed a command to force a Group Policy update on all Active Directory computers in the “starfleet.corp” domain. This command had a high number of indicators associated with it, including 127 Reconnaissance indicators, 16 Evasion indicators, and 136 General indicators. The high number of indicators suggests that the PowerShell command may have been used for malicious purposes, such as gathering information about the network or attempting to evade detection.

In this case, a PowerShell process forced a group policy update, which triggered various indicators like Reconnaissance & Evasion. Purple then presents aggregations on the activity made by the suspicious process:

The PowerShell process also performed several file operations, including creating 4 files, modifying 11 files, and deleting 4 files. Additionally, the process made 6 DNS requests and established 15 outgoing network connections to the IP address 192.168.192.22 on port 49667. The network connections were successful, and the event was classified as an “IP Connect” event with a repetition count of 2.

Purple will then move on to provide additional information on the entities associated with the malicious process, like users or files. Suspicious behaviors or attributes associated with these entities will be highlighted as well.

The user “STARFLEETjeanluc” was associated with both the “ResistanceIsFutile.exe” process and the PowerShell process. The PowerShell process had an unsigned active content file associated with it, which was located on an unknown device and file path. This further raises suspicion about the nature of the activity.

Finally, Purple summarizes the activity, highlighting the malicious entities involved, and provides a conclusion along with recommended next steps.

In conclusion, the event data suggests that the “ResistanceIsFutile.exe” process initiated a potentially malicious PowerShell command to force a Group Policy update on all Active Directory computers in the “starfleet.corp” domain. The high number of indicators, file operations, and network connections associated with the PowerShell process, as well as the unsigned active content file, indicate that this activity should be investigated further by cybersecurity analysts.”

Now in possession of an accurate analysis with a high level of detail, the analyst is rapidly able to copy and paste the insights generated by Purple into a threat analysis report, or initiate further mitigation and incident response steps.

Conclusion

Purple AI is an integrated generative AI that allows threat hunters and SOC team analysts to leverage the power of LLMs (large language models) from within the SentinelOne console to identify and respond to attacks faster and easier. Using natural language conversational prompts and responses, even less-experienced or resourced security teams can rapidly expose suspicious and malicious behaviors that hitherto were only possible to discover with highly-trained analysts dedicating many hours of effort.

Purple AI will be delivered as part of SentinelOne’s threat-hunting experience and is  available in limited preview today. Contact us for more information or to request a demo.

Day 1 From RSAC 2023 | The Future Starts Now, Together

San Francisco, are you ready for this year’s RSA Conference? The team at SentinelOne is excited to kick off RSAC 2023 and join our peers in the cybersecurity space for keynotes from industry-recognized experts, exclusive sessions, as well as training and demos.

RSA Conference, like years before, will connect cybersecurity leaders and defenders from across all industry verticals with transformative solutions. Be sure to check our daily posts covering all the details from each day of the event so you don’t miss out!

RSA 2023 | Stronger Together

This week, RSAC invites the community to build on each other’s diverse knowledge and foster breakthroughs in the cyber protection landscape. For the next four days, this year’s event centers around the theme, Stronger Together, focused on exchanging ideas, sharing stories of success, and examining areas where the community can join forces for collective safety.

SentinelOne Has Landed | Where to Find Us

We can’t wait to connect with everyone attending the event this year – come find us at Booth S-626 to chat with our team, get some next-level swag, and more.

A New Era | Combining Speed & Security Together

Whether it’s about facing every corner with hair-trigger reflexes or responding in real-time to advanced threats, speed means constantly learning, thinking, adjusting to whatever the environment calls for every second of everyday. That’s why SentinelOne is proud to empower organizations like the Aston Martin Aramco Cognizant Formula One™ Team with first-in-class cybersecurity protection.

Visit our F1 Booth 4417 to learn how SentinelOne’s Singularity XDR platform has revolutionized its approach to security to protect every Aston Martin cloud workload, IoT device, and endpoint with AI-powered technology that prevents and adapts to cyberattacks at machine speed.

Event Announcements & Highlights

We kick of RSA 2023 with a very special announcement: a first-of-its-kind integration of a generative AI-powered threat hunting tool within the SentinelOne management console. This will allow security teams to improve their productivity and uncover more threats. The integration of generative AI within the platform also simplifies threat hunting, allowing SOC teams to scale up their threat hunting efforts while reducing the level of skill needed by SOC team analysts.

On the first day of RSAC, join the SentinelOne team for the following sessions:

“This Is the Last of Them | Finding & Protecting Cloud VMs”

  • Speaker: Rick Bosworth
  • When: Monday, April 24 @ 5:20PM

Do you know what cloud computer instances are hiding in your hybrid-cloud infrastructure? Once they are found, how do you protect them from runtime threats like ransomware, cryptojacking, memory injection, and more? Join SentinelOne’s Director of Product Marketing, Rick Bosworth, to discuss how to automatically discover the lost sheep amongst your cloud virtual machines (VMs) so you can bring them back into your field of vision.

“Debunking Common Myths About Cloud Security”

  • Speakers: Milad Aslaner & Mani Keerthi Nagothu
  • When: Monday, April 24 @ 5:40PM

Everyone is talking about the cloud, but what do we really need to protect? There is a lot of buzz around AI-powered cloud protection and many other different technologies like cloud workload protection, but none of these alone are enough to help organizations truly understand what they need. Join SentinelOne’s Senior Director of Global Field CISO, Milad Aslaner and CISO Associate Director, Mani Keerthi Nagothu, in a session discussing the threat landscape, real-world cloud-centric attacks, and how to demystify the various cloud security technologies and how they really work together.

“Clearing Up the ITDR Confusion”

  • Speaker: Joseph Salazar
  • When: Monday, April 24 @ 6:20PM

Identity Threat Detection and Response (ITDR) is a relatively new area of security that focuses on securing identities and identity management systems, but there seems to be a confusion as to what it actually is. Many vendors claim to offer ITDR solutions but only focus on IAM tools and don’t provide detection or response capabilities. At this session, join SentinelOne’s Technical Marketing Engineer, Joseph Salazar,  to learn what ITDR really is and how it can help accelerate security within your organization.

Register Now! | The SentinelOne FOMO After Party

After a full day of bumping shoulders with the top security partners in the cyber community, spend an evening bumping to the beats of multi-Grammy award nominated Kaskade at the 2023 RSAC FOMO after party!

Limited tickets are available so be sure to register now and join the waitlist today! SentinelOne is proud to host this exclusive networking event featuring live entertainment, specialty cocktails, and gourmet snacks.

The Future Starts Now | Securing the Best at RSA 2023

This year’s RSAC will no doubt be filled with exciting announcements! Be sure to schedule an in-person meeting with us before the week is out and come by our booth (S-626) to become a part of the movement set on moving cybersecurity forward, together.

Join SentinelOne @ RSAC 2023
Booth S-626 | April 24-27

The Good, the Bad and the Ugly in Cybersecurity – Week 16

Time to Patch | Google Issues Warnings for the First Two Zero-Day Vulnerabilities of 2023

Google has released emergency patches for two high-severity zero-day vulnerabilities affecting Chrome, CVE-2023-2136 and CVE-2023-2033, with the latter being actively exploited in the wild. Google is currently restricting access to further details until a majority of Chrome’s 3 billion users have applied the fix.

CVE-2023-2136 targets an integer overflow in Google’s Skia used in Chrome, allowing a remote attacker to perform a sandbox escape via a crafted HTML page if they compromised the renderer process. CVE-2023-2033 is a vulnerability targeting a confusion weakness in the Chrome V8 JavaScript engine. This type of flaw allows attackers to trigger browser crashes through reading or writing memory out-of-buffer bounds. It could also be exploited to run arbitrary code on vulnerable devices.

The latest version of the browser, v112.0.5615.137/138, includes a total of eight fixes. Currently, the stable release covers Windows and Macs and a rollout for Linux is scheduled to arrive in the coming days.

Data Exfiltration | Vice Society Ransomware Gang Uses New Stealthy PowerShell Tool

Notorious ransomware group, Vice Society, has been exercising a ‘rather sophisticated’ PowerShell script to automate data theft from compromised networks. The new tool employs living-off-the-land binaries and scripts (LOLBAS) designed to sidestep alarms from security software used by the targeted party so they can reach the encryption phase of the attack.

Researchers first observed this tool earlier this year when Vice Society began using a script named w1.ps1 referenced in a Script Block Logging event to exfiltrate data from a victim’s network. The script automates the data exfiltration process through multiple functions to identify vulnerable directories where data can be exfiltrated via HTTP POST requests to Vice Society’s servers.

Overview of the script’s functions (Source: Unit 42)

Threat actors often leverage stolen corporate and customer data to extort a higher ransom from their victims and resell to other criminals for additional profit. Vice Society’s newest script allows them to operate stealthily and keep their footprint small – all signs of further evolution since debuting their new file encryptor, PolyVice, back in December 2022.

Critical RCE Flaws | Sandbox Escape PoCs Available for VM2 JavaScript Library

Three recent sandbox escape proof-of-concept (POC) exploits have been released, all enabling attackers to execute malicious code on hosts running VM2. A specialized JavaScript sandbox, VM2 is commonly used by pen-testing frameworks and code editors to run and test untrusted code in isolation. All three flaws have been assigned a critical scoring of 9.8.

CVE-2023-29017 describes a case where VM2 does not properly handle host objects passed to Error.prepareStackTrace during unhandled async errors. Using this, attackers could gain remote code execution rights. CVE-2023-29199 affects VM2’s source code transformer. If exploited, it allows attackers to bypass sandbox protections and gain remote code execution rights on the host running the sandbox. CVE-2023-30547 prevents the handleException() function from sanitizing exceptions discovered in the sandbox. By escaping these sandbox restrictions, attackers can perform arbitrary code execution in the host and potentially set up severe cyberattacks.

VM2 strongly recommends all users and developers using the VM2 library to upgrade to version 3.9.17 to address the security flaws.

LockBit Ransomware | New & Incomplete Samples of macOS Variant Surface

Researchers this week revealed details of a LockBit ransomware sample compiled for Apple’s macOS arm64 architecture. As of now, there are no reports of LockBit for Mac being exploited in the wild, nor any associated distribution method.

The discovered samples use “test” as a hardcoded password for execution, inviting speculation that the threat remains in its development stages. Researchers found that the Mac variant is a direct descendant of the Linux version, recycling much of the same code. Further, the Mac variant does not appear to be capable of exfiltrating the data it locks and has not been shown to have any method of persistence.

A breakdown of the variant shows that there is yet to be a credible threat to Mac endpoints at this time. Though the samples are underdeveloped, a LockBit spokesperson has said development of a Mac ransomware payload is an active project, raising concerns that more effective payloads targeting Apple Mac devices may be not far over the horizon.

Operation DreamJob | Tools Found in Linux Malware Found Tied to 3CX Supply Chain Attack

Operation DreamJob, a long-running campaign led by Lazarus group, has been observed targeting Linux for the first time this week. Using social engineering tactics to target job searchers on various platforms, victims are tricked into downloading malicious files disguised as files containing job opportunities.

After dropping malware on the victim’s device, a ZIP containing a Go-written Linux library is distributed masquerading as a PDF file, prompting victims to double click and launch the “OdicLoader” malware. A second-stage, C++ backdoor called SimplexTea is then launched.

Illustration of probable chain of compromise (Source: Welive Security)

The use of this backdoor and other common artifacts have resulted in researchers linking Operation DreamJob to Smooth Operator – the recent supply chain attack against VoIP provider, 3CX. The attack on 3CX has garnered major attention from the cyber defense community over the past four weeks; the most severe in the growing trend of supply chain attacks.

This Linux-based malware attack attributed to Lazarus is evidence of how threat actors are continuing to grow their arsenal and tactics, expanding their malware variants to target more systems than before.

Avoiding the Storm | How to Protect Cloud Infrastructure from Insider Threats

One of the most significant security threats to cloud infrastructure is insider threats. As more businesses move to cloud and hybrid environments, employees sending sensitive data to unsecured or misconfigured clouds risk exposing their organization to advanced cyber threats and opportunistic attackers.

The importance of cloud infrastructure to businesses of all sizes along with the privileged access that insiders often have mean that mitigating the risk of insider threats is now high on the list of priorities for mature security teams. In this post, we describe and explore best practices that security teams can implement to safeguard cloud infrastructures from insider threats.

Why Are Insiders Considered a Main Risk to Cloud?

Whether out of negligence or presenting malicious intent, insider threats pose a serious risk to cloud security as they are harder to detect and respond to. Since they are already part of the organization, they are considered ‘trusted’. Unlike an external intruder, insiders do not have to breach external security measures to access sensitive assets.

Insider risks can stem from a great many reasons. Malicious insiders, for example, may be motivated to do harm to a system in return for a bribe or in retaliation for a perceived slight. Their goals can range from intentional data theft, data destruction, espionage, or personal benefit.  Since malicious insiders have the benefit of time, they are able to study the system and craft a serious attack based on specific weak points in the infrastructure they are privy to.

In Ponemon’s most recent research on Insider Threats, the findings reveal that both negligent and malicious insider risks as well as credential theft have grown 44% in the last two years alone. Incidents involving compromised users have since racked up costs amounting to over $15 million dollars globally.

In many of these incidents, cloud infrastructures have been the main target with Ponemon’s report indicating that 52% of enterprises name cloud security as one of their greatest risks.

The following best practices can help security teams to mitigate these risks.

1. Implement Least Privilege Access Control

Defending against insider threats is a persistent challenge that requires continuous monitoring. One of the key ways to defend sensitive data and systems is to limit the number of users who have access to it as well as the permissions they have whilst exercising that access. To minimize the access of potential insider risk, enterprises can implement the principle of least privilege (PoLP).

The principle of least privilege is a security concept that states that every user, program, or system component should only have access to the resources they need to perform their function and no more. This works to minimize the potential damage that can happen as a result of a security breach or a misconfiguration.

The idea behind the principle of least privilege is that by limiting access to resources, the attack surface is reduced. By limiting the resources that a user or program can access, it makes it more difficult for attackers to gain access to sensitive information. For example, a user who only needs to read files in a specific directory should not have write access to that directory. Similarly, a program that only needs to access certain system files should not have access to other parts of the system.

2. Conduct Regular Security Awareness Training

An uncomfortable fact is that sometimes, insider behavior is carried out unknowingly by a negligent or untrained legitimate user. The Ponemon report cited 56% of incidents related to negligence in comparison to the 26% related to criminal insiders. This makes negligence a root cause in most cybersecurity incidents and varies anywhere from unsecured devices, unprotected passwords, not following their organization’s security policies, or forgetting to patch or upgrade their software.

Unintentional insider threats can arise from the smallest of actions, such as clicking on malicious links or sharing sensitive information with unauthorized individuals. Enterprise leaders can combat this type of insider threat by implementing regular and accessible security awareness training and fostering a culture of good cyber hygiene. Employees who are trained on how to recognize the signs and consequences of insider risks can help prevent them from occurring in the first place. Security awareness training programs often cover a wide range of topics including phishing, password hygiene, social engineering recognition, and how to correctly report anomalous behavior they see.

3. Use Behavioral Analytics

Behavioral analytics can be a powerful tool for security teams working to mitigate insider risks in their cloud environments. By measuring real-time behaviors against a predetermined state of normalcy, analytics can help raise a red flag on any anomalies that may indicate potential malicious activity.

For instance, behavioral analytics can monitor user activities such as login times, locations, and access patterns to detect any suspicious changes or deviations from their normal behavior. It can also detect attempts to access unauthorized resources, perform unauthorized actions, or exfiltrate data.

Behavioral analytics is instrumental to how security teams streamline their hunt for potential insider threats. The more time is saved during that crucial hunting stage, the more effective the response can be in stopping incidents from becoming full-blown security crises. Even in post-event processes, behavioral analytics provides valuable insights into the motivations and patterns of insider threats, helping teams to develop or improve their existing security policies and procedures. Learning from the analytic is often a strong foundation upon which training programs can be created.

4. Implement DSPM (Data Security Posture Management)

Planning the security of business-critical data requires a comprehensive approach to data security and privacy. Implementing data security posture management (DSPM) can help enterprises manage their data access and prevent data leakage by implementing policies and controls to protect sensitive data from unauthorized access, sharing, and exfiltration.

In cloud infrastructures, DSPM is designed to help prevent insider threats by detecting and blocking attempts to transmit sensitive data outside the infrastructure. It works by:

  • Controlling Access – DSPM can help enforce access control policies, ensuring that only authorized users have access to sensitive data. This can include implementing role-based access controls, multi-factor authentication, and other access management controls.
  • Classifying Data – DSPM can help classify data based on its sensitivity level and apply appropriate security controls to protect it. This can include encryption, data masking, and data loss prevention (DLP) technologies.
  • Monitoring & Logging – DSPM solutions can monitor and log all data access and usage, enabling security teams to detect any suspicious activity in real-time. This can include monitoring access patterns, data transfers, and other user activities.
  • Supporting Incident Response – DSPM can help organizations respond to security incidents quickly and effectively. This can include automated incident response workflows, as well as real-time alerts and notifications to security teams.

5. Conduct Regular Audits

Prolong the effectiveness of access control policies through regular audits. Security teams can effectively nip suspicion behavior in the bud when they are able to identify potential insider threats in their earliest stages. Audits should be conducted on a regular basis and cover all areas of the cloud infrastructure, including access controls, user activity, and data transmission.

Scheduling regular audits allow teams to detect subtle anomalies in user behavior and cloud infrastructure activity such as usual file sharing, copying, or deletions. Uncovering security gaps and vulnerabilities that a malicious insider could exploit is often the first step in improving security policies and processes and building a cycle of continuous improvement.

Conclusion

As cloud computing is adopted across all major industry verticals, security leaders are looking at the bigger picture of cloud-centric cyber risks across all possible attack surfaces – endpoint, identity, and network – to protect against both external and internal threats.

Since protecting a cloud infrastructure from insider threats requires a multi-faceted approach, leaders will rely on cloud-focused security solutions that can combine autonomous threat hunting, endpoint detection and response capability, and AI or machine-powered analytics to support all areas of cloud security.

SentinelOne is here to help enterprise leaders bolster their cloud defense strategies with least privilege access control, behavioral analytics, data loss prevention, and cloud workload protection. Contact us or request a demo to see how SentinelOne’s Singularity™ for Cloud leverages machine learning to provide detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices.

Singularity Cloud
Simplifying security of cloud VMs and containers, no matter their location, for maximum agility, security, and compliance.

3CX Breach Was a Double Supply Chain Compromise

We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX. The lengthy, complex intrusion has all the makings of a cyberpunk spy novel: North Korean hackers using legions of fake executive accounts on LinkedIn to lure people into opening malware disguised as a job offer; malware targeting Mac and Linux users working at defense and cryptocurrency firms; and software supply-chain attacks nested within earlier supply chain attacks.

Researchers at ESET say this job offer from a phony HSBC recruiter on LinkedIn was North Korean malware masquerading as a PDF file.

In late March 2023, 3CX disclosed that its desktop applications for both Windows and macOS were compromised with malicious code that gave attackers the ability to download and run code on all machines where the app was installed. 3CX says it has more than 600,000 customers and 12 million users in a broad range of industries, including aerospace, healthcare and hospitality.

3CX hired incident response firm Mandiant, which released a report on Wednesday that said the compromise began in 2022 when a 3CX employee installed a malware-laced software package distributed via an earlier software supply chain compromise that began with a tampered installer for X_TRADER, a software package provided by Trading Technologies.

“This is the first time Mandiant has seen a software supply chain attack lead to another software supply chain attack,” reads the April 20 Mandiant report.

Mandiant found the earliest evidence of compromise uncovered within 3CX’s network was through the VPN using the employee’s corporate credentials, two days after the employee’s personal computer was compromised.

“Eventually, the threat actor was able to compromise both the Windows and macOS build environments,” 3CX said in an April 20 update on their blog.

Mandiant concluded that the 3CX attack was orchestrated by the North Korean state-sponsored hacking group known as Lazarus, a determination that was independently reached earlier by researchers at Kaspersky Lab and Elastic Security.

Mandiant found the compromised 3CX software would download malware that sought out new instructions by consulting encrypted icon files hosted on GitHub. The decrypted icon files revealed the location of the malware’s control server, which was then queried for a third stage of the malware compromise — a password stealing program dubbed ICONICSTEALER.

The double supply chain compromise that led to malware being pushed out to some 3CX customers. Image: Mandiant.

Meanwhile, the security firm ESET today published research showing remarkable similarities between the malware used in the 3CX supply chain attack and Linux-based malware that was recently deployed via fake job offers from phony executive profiles on LinkedIn. The researchers said this was the first time Lazarus had been spotted deploying malware aimed at Linux users.

As reported in a recent series last summer here, LinkedIn has been inundated this past year by fake executive profiles for people supposedly employed at a range of technology, defense, energy and financial companies. In many cases, the phony profiles spoofed chief information security officers at major corporations, and some attracted quite a few connections before their accounts were terminated.

Mandiant, Proofpoint and other experts say Lazarus has long used these bogus LinkedIn profiles to lure targets into opening a malware-laced document that is often disguised as a job offer. This ongoing North Korean espionage campaign using LinkedIn was first documented in August 2020 by ClearSky Security, which said the Lazarus group operates dozens of researchers and intelligence personnel to maintain the campaign globally.

Microsoft Corp., which owns LinkedIn, said in September 2022 that it had detected a wide range of social engineering campaigns using a proliferation of phony LinkedIn accounts. Microsoft said the accounts were used to impersonate recruiters at technology, defense and media companies, and to entice people into opening a malicious file. Microsoft found the attackers often disguised their malware as legitimate open-source software like Sumatra PDF and the SSH client Putty.

Microsoft attributed those attacks to North Korea’s Lazarus hacking group, although they’ve traditionally referred to this group as “ZINC“. That is, until earlier this month, when Redmond completely revamped the way it names threat groups; Microsoft now references ZINC as “Diamond Sleet.”

The ESET researchers said they found a new fake job lure tied to an ongoing Lazarus campaign on LinkedIn designed to compromise Linux operating systems. The malware was found inside of a document that offered an employment contract at the multinational bank HSBC.

“A few weeks ago, a native Linux payload was found on VirusTotal with an HSBC-themed PDF lure,” wrote ESET researchers Peter Kalnai and Marc-Etienne M.Leveille. “This completes Lazarus’s ability to target all major desktop operating systems. In this case, we were able to reconstruct the full chain, from the ZIP file that delivers a fake HSBC job offer as a decoy, up until the final payload.”

ESET said the malicious PDF file used in the scheme appeared to have a file extension of “.pdf,” but that this was a ruse. ESET discovered that the dot in the filename wasn’t a normal period but instead a Unicode character (U+2024) representing a “leader dot,” which is often used in tables of contents to connect section headings with the page numbers on which those sections begin.

“The use of the leader dot in the filename was probably an attempt to trick the file manager into treating the file as an executable instead of a PDF,” the researchers continued. “This could cause the file to run when double-clicked instead of opening it with a PDF viewer.”

ESET said anyone who opened the file would see a decoy PDF with a job offer from HSBC, but in the background the executable file would download additional malware payloads. The ESET team also found the malware was able to manipulate the program icon displayed by the malicious PDF, possibly because fiddling with the file extension could cause the user’s system to display a blank icon for the malware lure.

Kim Zetter, a veteran Wired.com reporter and now independent security journalist, interviewed Mandiant researchers who said they expect “many more victims” will be discovered among the customers of Trading Technologies and 3CX now that news of the compromised software programs is public.

“Mandiant informed Trading Technologies on April 11 that its X_Trader software had been compromised, but the software maker says it has not had time to investigate and verify Mandiant’s assertions,” Zetter wrote in her Zero Day newsletter on Substack. For now, it remains unclear whether the compromised X_Trader software was downloaded by people at other software firms.

If there’s a silver lining here, the X_Trader software had been decommissioned in April 2020 — two years before the hackers allegedly embedded malware in it.

“The company hadn’t released new versions of the software since that time and had stopped providing support for the product, making it a less-than-ideal vector for the North Korean hackers to infect customers,” Zetter wrote.

How to Understand and Implement CISA’s Zero Trust Maturity Model

Current and emerging cyber threats continue to show global enterprises why traditional security measures are no longer adequate defenses. To help enterprises pave a clearer path forward in building cyber resilience, the Cybersecurity and Infrastructure Security Agency (CISA) recently released its Zero Trust Maturity Model (ZTMM).

The ZTMM provides a framework for business in all industries as they implement zero trust policies into their day-to-day operations and overarching security strategies. Zero trust has rapidly become an essential element in crafting a strong security posture capable of staving off modern adversaries.

In this post, we explore the key elements of CISA’s recommendations for zero trust and how SentineOne’s AI-powered XDR platform empowers enterprises to meet the challenge of embracing zero trust in today’s digital landscape.

Understanding CISA’s Approach to Implementing Zero Trust

CISA’s ZTMM provides guidance in the development of effective and actionable zero trust strategies and solutions. Their approach to zero trust revolves around the reduction of cyber risk, increasing speed and agility to stay paces ahead of adversaries, and improving enterprises’ overall security defenses and resilience.

The premise of zero trust adheres to a strategy where no user or asset is to be implicitly trusted in an environment. This involves adopting an ‘assume breach’ mentality and works by making continuous verification of each user, device, and application mandatory. Zero trust as a whole requires enterprises to evolve their greater security philosophy, culture, and policies.

While the ZTMM is specifically tailored for federal agencies, businesses in all verticals can benefit from these recommendations and use them to safeguard against industry-specific risks.

What Are the Five Pillars of ZTMM?

CISA’s ZTMM is comprised of five main pillars: Identity, Devices, Networks, Applications and Workloads, and Data.

  • Identity – This pillar focuses on authenticating and authorizing users and devices before granting access to resources. It involves creating a unified identity and access management (IAM) system and implementing multi-factor authentication (MFA) for all users.
  • Devices – This pillar focuses on securing all IoT devices that connect to an organization’s network. It involves creating a comprehensive inventory of all devices and implementing endpoint detection and response (EDR) solutions.
  • Networks – This pillar focuses on securing all network traffic, regardless of the user’s location or resource. It involves implementing network segmentation and micro-segmentation to limit resource access and use secure communication protocols such as Transport Layer Security (TLS).
  • Applications and Workloads – This pillar focuses on securing all applications and workloads, whether they’re hosted on-premises or in the cloud. It involves implementing application-level access controls and using secure coding practices to prevent vulnerabilities.
  • Data – This pillar focuses on securing all data, whether it is at rest or in transit. It involves implementing encryption and access controls to prevent unauthorized access to sensitive data.

Essential Capabilities for Effective Zero Trust

In CISA’s zero trust framework, three cross-cutting capabilities can be used by enterprises on their journey to adopting zero trust: Visibility and Analytics, Automation and Orchestration, and Governance. These capabilities support the interoperability of functions across the pillars.

  • Visibility and Analytics – Focusing on data analysis allows enterprises to better inform policy decisions, action response activities, and build out risk profiles so security teams can proactively take measures before incidents occur.
  • Automation and Orchestration – In a zero trust model, automated tools and workflows support security response functions while maintaining oversight, security, and interaction of the development process for such functions, products, and services.
  • Governance – This refers to the definition and enforcement of cybersecurity policies, procedures, and processes. Senior leadership in an enterprise holds accountability in managing and mitigating security risks in support of zero trust principles from the top down.
Source: CISA

Implementing these pillars can be a complex process requiring significant organizational planning and coordination. However, the benefits of implementing zero trust are substantial, improving security posture, reducing risk of data breaches, and increasing visibility into network activity.

How SentinelOne Supports Successful Zero Trust Adoption

Implementing zero trust requires a comprehensive approach that covers all aspects of an organization’s cybersecurity strategy. Enterprises worldwide trust the SentinelOne platform to enable their ongoing journey in adopting zero trust policies that work for their businesses.

The SentinelOne platform helps streamline and action many of the recommendations from CISA’s ZTMM by extending visibility, analytics, and response capabilities across endpoint, identity, cloud, and network surfaces.

Identity Pillar | Advanced Identity Protection & Threat Response

SentinelOne provides comprehensive identity and access management (IAM) capabilities, including MFA and single sign-on (SSO). Going a step further than traditional IAM, SentinelOne’s identity protection solution proactively reduces the identity infrastructure attack surface by closing gaps in commonly exploited Active Directory and Azure AD environments and thwarting attack progress through misdirection tactics

Devices Pillar | Autonomous Prevention, Detection & Response

SentinelOne’s EDR capabilities provide real-time visibility into endpoint activity, allowing organizations to detect and respond to threats rapidly. Since endpoints remain a key attack vector for threat actors, SentinelOne combines static and behavioral detections to neutralize known and unknown threats.

Networks Pillar | Powerful Network Detection Response & Micro-Segmentation

Lack of visibility due to legacy network controls breeds gaps and inconsistencies that threat actors can exploit. SentinelOne’s platform gives enterprises full visibility and control of their network, allowing security teams to monitor and isolate compromised devices and stop lateral movement. SentinelOne agents also create detailed network topology to support forensic investigations, decision making processes, and micro-segmentation policy creation.

Applications & Workloads Pillar | Complete Runtime Control & Workload Protection

Cloud computing and hybrid workspaces are commonplace now for the worlds’ businesses. As cloud-based attacks rise in number and complexity, SentinelOne combats threats on this attack surface by providing application-level access controls and uses secure coding practices to prevent vulnerabilities. Businesses can manage and secure hybrid, private, and multi-cloud workloads from a single console with a single agent.

Data Pillar | Shifting Away From Perimeter-Based Security

In the past, enterprises stored sensitive data behind their corporate networks. As more make the move over to cloud applications, simply defending the perimeter against external threats is not enough. SentinelOne’s platform provides encryption and access controls to prevent unauthorized access to sensitive data from the inside out.

Conclusion

The zero trust philosophy presents a shift from a location-centric model to an identity, context, and data-centric approach with fine-grained security controls between users, systems, applications, data, and assets that change over time. In CISA’s latest Zero Trust Maturity Model (ZTMM), enterprises are reminded of the “never trust, always verify” tenet that protects environments from both external and internal cyber threats.

As steady transformation in remote work policies and the rise of cloud adoption present new challenges for security defenders, SentinelOne is committed to helping enterprises implement zero trust architectures effectively. The Singularity platform is designed to provide comprehensive visibility and control over all endpoints, users, and networks in a single agent, allowing security teams to achieve optimal zero trust elements across all pillars of the ZTMM.

If you’re interested in learning more about how SentinelOne can help your business achieve the ideal level of zero trust maturity, contact us today or book a demo here.

SentinelOne for Zero Trust
Extend visibility, analytics, and response capabilities across endpoint, identity, cloud, and network, enabling rapid adoption of a Zero Trust security model

LockBit for Mac | How Real is the Risk of macOS Ransomware?

On April 16th, Twitter user @malwrhunterteam tweeted details of a sample of the LockBit ransomware compiled for Apple’s macOS arm64 architecture. LockBit claims to be “the oldest ransomware affiliate program on the planet”, and news that one of the major cybercrime outfits in the ransomware landscape was now targeting macOS devices has predictably raised concerns about the ransomware threat on Mac devices.

In this post, we explore both the details of the LockBit sample uncovered and the larger question of how real is the risk of ransomware on macOS endpoints.

LockBit for Mac | Testing, Testing, 1 2 3

The sample of LockBit ransomware for Mac was discovered on VirusTotal on April 16th, and according to @vxunderground may have been compiled as early as 17th November 2022.

lockbit ransomware variants for macOS
Source: vxunderground

A further sample was uploaded to VirusTotal on the 8th December, 2022.

lockbit for macOS on VirusTotal
Source: VirusTotal

The macOS samples are compiled solely for the Apple ARM M1/M2 (aka Apple silicon) architecture. No macOS Intel sample is known at this time.

Importantly for concerned users, no occurrences of LockBit for Mac have yet been reported in the wild, no victims claimed, and no distribution method is known to be associated with the malware. However, early claims that the sample was non-functional were incorrect.

LockBit 3.0 typically requires a unique password to execute; in the case of the Mac sample, the hardcoded password is “test” – one of several clues as to the current state of development of the threat.

The Mac variant is a direct descendant of the LockBit for Linux variant first spotted in Jan 2022, and contains much the same code.

The ransomware functions as intended to encrypt targeted files, which are subsequently appended with the .lockbit extension. The locker also deposits a rather lengthy ransom note in the parent folder with the name !!!-Restore-My-Files-!!!.

<img loading="lazy" class="size-full wp-image-79820" src="https://www.sentinelone.com/wp-content/uploads/2023/04/lockbit_macOS_2.jpg" alt="The ransom note is encrypted in the locker_Apple_M1_64
The ransom note is encrypted in the locker_Apple_M1_64 binary

The ransom note gives a clear indication of the intended victims.

Opening paragraph of the LockBit for Mac ransom note
Opening paragraph of the LockBit for Mac ransom note

LockBit is known for attacking and extorting organizations rather than random individuals on the internet, and the aim of the developers is to make large profits from locking and stealing business data.

The Mac sample does not appear to implement any functionality for exfiltrating the data it locks, nor does it have any method of persistence: more clear signs that this is a “work in progress” and not a genuine payload intended for use in the wild.

LockBit for Mac | Execution and Encryption

Despite the underdeveloped nature of the samples, it is clear that the authors are experimenting with similar functionality seen in lockers for other platforms. The malware is intended to be executed by a human operator or configuration file and offers a number of different encryption options. These mirror those seen in the Linux version noted above.

Command line options that can be passed to the malware on execution
Command line options that can be passed to the malware on execution

These can be seen reflected in the methods seen in the code.

Encryption functions in the LockBit for Mac ransomware sample
Encryption functions in the LockBit for Mac ransomware sample

Although there is a list of hardcoded extension names, many of which are not applicable to macOS, the locker is not restricted to encrypting only files with those extensions. As noted above, an operator may specify a particular destination and attempt to encrypt all files in that destination, partially or entirely.

LockBit is not restricted to the list of hardcoded extensions
LockBit is not restricted to the list of hardcoded extensions

Much of the code and methods apply to non-macOS platforms such as Windows, ESXi and Linux, indicating that the samples were likely compiled from the same cross-platform source code.

A lot of the LockBit code is redundant for macOS targets
A lot of the LockBit code is redundant for macOS targets

On execution on an Apple M1 or M2 device, the LockBit ransomware queries for the model name via sysctl hw.model, likely as part of anti-analysis measures.

Encryption takes advantage of the publicly available library Mbed TLS. Interestingly, there appear to be no cross-references to the functions intended to decrypt locked files.

Multiple cross-references appear for encryption functions, but none for decryption
Multiple cross-references appear for encryption functions, but none for decryption

According to one media report, the public-facing representative of LockBit, known as LockBitSupp, said that the Mac encryptor is “actively being developed”. Perhaps more complete samples may be over the horizon with the missing functionality.

Is Ransomware a Real Risk on macOS Today?

Due to the rampant nature of the ransomware threat on other platforms, it is only natural to wonder how safe Macs are from ransomware actors. While some security vendors have incorrectly made much of it in the past, the reality is that there is no publicly recorded case of any business ever paying a ransom demand as a result of macOS ransomware. This is not surprising when you look at the history of attempts to build ransomware on macOS to date.

The most recent known Mac ransomware prior to the LockBit sample found this week was EvilQuest (aka ThiefQuest). SentinelLabs analysis of the threat and subsequent publication of a decryptor revealed that the actual ransomware component was unfit for purpose. Despite garnering headlines like “New Mac Ransomware Is Even More Sinister Than It Appears”, not only was the encryption weak, the ransom note did not include a way for intended victims to contact the threat actors to exchange their money for a decryption key: It merely included a crypto wallet address and a demand for the princely sum of $50.

Ransom note from EvilQuest/ThiefQuest
Ransom note from EvilQuest/ThiefQuest

Unsurprisingly, that wallet remains empty today, having never received a single transaction. Though EvilQuest was certainly a real threat and continued to infect devices over the following 12 months or so, its infostealing and keylogging capabilities were likely the real reward for the threat actors: As ransomware, it failed entirely.

EvilQuest / ThiefQuest wallet shows no one ever paid a ransom to this address
EvilQuest / ThiefQuest wallet shows no one ever paid a ransom to this address

Prior to 2020, the next most recent macOS ransomware attempt was Patcher, discovered by ESET in 2017. Patcher (aka FindZip) was distributed in cracked apps on torrent sites and, much like EvilQuest, never recorded a single transaction to its bitcoin address.

Ransom note from Patcher aka FileCoder
Ransom note from Patcher malware

Patcher was preceded in 2016 by KeRanger, a functional ransomware distributed through a trojanized version of the popular Transmission bittorrent client. KeRanger appears to have been precisely $3.02 more successful than either EvilQuest or Patcher ransomware: Its bitcoin wallet shows exactly one transaction – not necessarily from a victim – of that value.

We have to go back to 2014 to find the next occurrence of macOS ransomware. FileCoder was discovered on VirusTotal and was said to have been lying around on the site for two years. Unfinished and unworkable, FileCoder was a POC that did not actually encrypt the user’s files but demonstrated encryption and decryption of a sample file included with the malware. It is thought to be the precursor to the Patcher/FindZip malware discussed above.

In short, the history of ransomware on macOS to date shows that there has yet to be a viable threat or any ransomware that has financially impacted any individuals or organizations.

How to Stay Safe from LockBit macOS Ransomware

At the present time, SentinelOne does not consider LockBit a serious threat for macOS endpoints. As noted above, the known samples are very much a Proof-of-Concept and not suitable for deployment by threat actors in their current state. However, news outlets have reported that LockBit developers do consider a Mac file locker an active project, meaning that this situation may change in the near future.

As a precaution, the SentinelOne agent detects LockBit for Mac and protects macOS endpoints from executing the sample.

The SentinelOne Agent on macOS detects the LockBit ransomware
The SentinelOne Agent on macOS detects the LockBit ransomware

macOS security teams whose organizations are not protected by SentinelOne may refer to the Indicators of Compromise below for threat hunting and detection.

Conclusion

Are the big game hunters coming to a macOS endpoint near you? Not yet, but that doesn’t mean they won’t. The development of a Mac-specific ransomware variant suggests that the thought has obviously occurred to some threat actors sufficiently to invest time in producing a test sample, but that sample is far from ready for use against real targets. More importantly, from a threat actor’s point of view, locking files on Macs is not really a viable use case, though it may create some headlines, since service disruption in many cases is not likely to be severe – few organizations use Mac servers for essential services. In addition, worming from one Mac to another in the way Windows malware often does is exponentially more difficult on Macs. Consequently, the return on investment for a ransomware actor in deploying file locking malware on a Mac endpoint is likely to be substantially lower than similar attacks on Windows and Linux servers

Stealing data, however, is very much a viable use case for threat actors targeting Macs. As ransomware actors in general have transitioned to extorting enterprises to prevent stolen data being leaked, it should not come as a surprise if LockBit and other cybercrime outfits begin turning their attention to ways to achieve the same on macOS. Indeed, infostealers are very much a concern on the platform and security teams are advised to review our recent publications on these and on how threat actors can compromise Macs in the enterprise. If LockBit and other ransomware actors are coming for enterprises with macOS devices, it is the theft of data rather than the locking of files that will provide them with the most lucrative rewards.

Indicators of Compromise

File name SHA1
locker_Apple_M1_64 2d15286d25f0e0938823dcd742bc928e78199b3d
locker_Apple_M1_64 864f56b25a34e9532a1175d469715d2f61c56f7f
!!!-Restore-My-Files-!!! ef958f3cf201f9323ceae9663d86464021f8e10d

YARA Hunting Rule

private rule Macho {
	meta:
		description = "private rule to match Mach-O binaries"

	condition:
		uint32(0) == 0xfeedface or uint32(0) == 0xcefaedfe or uint32(0) == 0xfeedfacf or uint32(0) == 0xcffaedfe or uint32(0) == 0xcafebabe or uint32(0) == 0xbebafeca

}

rule LockBit_for_Mac {

	meta:
		author = "Phil Stokes, @philofishal"
		description = "Rule to detect LockBit sample with Arm64 architecture for Apple M1"
		date = "18 April 2023"
		sha1_a = "2d15286d25f0e0938823dcd742bc928e78199b3d"
                sha1_b = "864f56b25a34e9532a1175d469715d2f61c56f7f"

		ref = "https:/s1.ai/LockBit-Mac"
	strings:
		$ransom = { 58 5b 55 5c 19 4b 58 57 4a 56 54 4e 58 4b 5c 19 } // encrypted ransom note string
		$sysctl = { 4a 40 4a 5a 4d 55 19 51 4e 39 5e 4b 5c 49 19 51 } // encrypted sysctl hw grep string
		$label = "bSelfRemove"

	condition:
		Macho and all of them

}

Giving a Face to the Malware Proxy Service ‘Faceless’

For the past seven years, a malware-based proxy service known as “Faceless” has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless customers can route their malicious traffic through tens of thousands of compromised systems advertised on the service. In this post we’ll examine clues left behind over the past decade by the proprietor of Faceless, including some that may help put a face to the name.

The proxy lookup page inside the malware-based anonymity service Faceless. Image: spur.us.

Riley Kilmer is co-founder of Spur.us, a company that tracks thousands of VPN and proxy networks, and helps customers identify traffic coming through these anonymity services. Kilmer said Faceless has emerged as one of the underground’s most reliable malware-based proxy services, mainly because its proxy network has traditionally included a great many compromised “Internet of Things” devices — such as media sharing servers — that are seldom included on malware or spam block lists.

Kilmer said when Spur first started looking into Faceless, they noticed almost every Internet address that Faceless advertised for rent also showed up in the IoT search engine Shodan.io as a media sharing device on a local network that was somehow exposed to the Internet.

“We could reliably look up the [fingerprint] for these media sharing devices in Shodan and find those same systems for sale on Faceless,” Kilmer said.

In January 2023, the Faceless service website said it was willing to pay for information about previously undocumented security vulnerabilities in IoT devices. Those with IoT zero-days could expect payment if their exploit involved at least 5,000 systems that could be identified through Shodan.

Notices posted for Faceless users, advertising an email flooding service and soliciting zero-day vulnerabilities in Internet of Things devices.

Recently, Faceless has shown ambitions beyond just selling access to poorly-secured IoT devices. In February, Faceless re-launched a service that lets users drop an email bomb on someone — causing the target’s inbox to be filled with tens of thousands of junk messages.

And in March 2023, Faceless started marketing a service for looking up Social Security Numbers (SSNs) that claims to provide access to “the largest SSN database on the market with a very high hit rate.”

Kilmer said Faceless wants to become a one-stop-fraud-shop for cybercriminals who are seeking stolen or synthetic identities from which to transact online, and a temporary proxy that is geographically close to the identity being sold. Faceless currently sells this bundled product for $9 — $8 for the identity and $1 for the proxy.

“They’re trying to be this one-stop shop for anonymity and personas,” Kilmer said. “The service basically says ‘here’s an SSN and proxy connection that should correspond to that user’s location and make sense to different websites.’”

MRMURZA

Faceless is a project from MrMurza, a particularly talkative member of more than a dozen Russian-language cybercrime forums over the past decade. According to cyber intelligence firm Flashpoint, MrMurza has been active in the Russian underground since at least September 2012. Flashpoint said MrMurza appears to be extensively involved in botnet activity and “drops” — fraudulent bank accounts created using stolen identity data that are often used in money laundering and cash-out schemes.

Faceless grew out of a popular anonymity service called iSocks, which was launched in 2014 and advertised on multiple Russian crime forums as a proxy service that customers could use to route their malicious Web traffic through compromised computers.

Flashpoint says that in the months before iSocks went online, MrMurza posted on the Russian language crime forum Verified asking for a serious partner to assist in opening a proxy service, noting they had a botnet that was powered by malware that collected proxies with a 70 percent infection rate.

MrMurza’s Faceless advertised on the Russian-language cybercrime forum ProCrd. Image: Darkbeast/Ke-la.com.

In September 2016, MrMurza sent a message to all iSocks users saying the service would soon be phased out in favor of Faceless, and that existing iSocks users could register at Faceless for free if they did so quickly — before Faceless began charging new users registration fees between $50 and $100.

Verified and other Russian language crime forums where MrMurza had a presence have been hacked over the years, with contact details and private messages leaked online. In a 2014 private message to the administrator of Verified explaining his bona fides, MrMurza said he received years of positive feedback as a seller of stolen Italian credit cards and a vendor of drops services.

MrMurza told the Verified admin that he used the nickname AccessApproved on multiple other forums over the years. MrMurza also told the admin that his account number at the now-defunct virtual currency Liberty Reserve was U1018928.

According to cyber intelligence firm Intel 471, the user AccessApproved joined the Russian crime forum Zloy in Jan. 2012, from an Internet address in Magnitogorsk, RU. In a 2012 private message where AccessApproved was arguing with another cybercriminal over a deal gone bad, AccessApproved asked to be paid at the Liberty Reserve address U1018928.

In 2013, U.S. federal investigators seized Liberty Reserve and charged its founders with facilitating billions of dollars in money laundering tied to cybercrime. The Liberty Reserve case was prosecuted out of the Southern District of New York, which in 2016 published a list of account information (PDF) tied to thousands of Liberty Reserve addresses the government asserts were involved in money laundering.

That document indicates the Liberty Reserve account claimed by MrMurza/AccessApproved — U1018928 — was assigned in 2011 to a “Vadim Panov” who used the email address lesstroy@mgn.ru.

PANOV

Constella Intelligence, a threat intelligence firm that tracks breached databases, says lesstroy@mgn.ru was used for an account “Hackerok” at the accounting service klerk.ru that was created from an Internet address in Magnitogorsk. The password chosen by this user was “1232.”

In addition to selling access to hacked computers and bank accounts, both MrMurza and AccessApproved ran side hustles on the crime forums selling clothing from popular retailers that refused to ship directly to Russia.

On one cybercrime forum where AccessApproved had clothing customers, denizens of the forum created a lengthy discussion thread to help users identify incoming emails associated with various reshipping services advertised within their community. Reshippers tend to rely on a large number of people in the United States and Europe helping to forward packages overseas, but in many cases the notifications about purchases and shipping details would be forwarded to reshipping service customers from a consistent email account.

That thread said AccessApproved’s clothing reshipping service forwarded confirmation emails from the address panov-v@mail.ru. This address is associated with accounts on two Russian cybercrime forums registered from Magnitogorsk in 2010 using the handle “Omega^gg4u.”

This Omega^gg4u identity sold software that can rapidly check the validity of large batches of stolen credit cards. Interestingly, both Omega^gg4u and AccessApproved also had another niche: Reselling heavily controlled substances — such as human growth hormone and anabolic steroids — from chemical suppliers in China.

A search in Constella on the address panov-v@mail.ru and many variations on that address shows these accounts cycled through the same passwords, including 055752403k, asus666, 01091987h, and the relatively weak password 1232 (recall that 1232 was picked by whoever registered the lesstroy@mgn.ru account at Klerk.ru).

Constella says the email address asus666@yandex.ru relied on the passwords asus666 and 01091987h. The 01091987h password also was used by asus666@mail.ru, which also favored the password 24587256.

Constella further reports that whoever owned the much shorter address asus@mail.ru also used the password 24587256. In addition, it found the password 2318922479 was tied to both asus666@mail.ru and asus@mail.ru.

The email addresses asus@mail.ru, asus2504@mail.ru, and zaxar2504@rambler.ru were all used to register Vkontakte social media accounts for a Denis ***@VIP*** Pankov. There are a number of other Vkontakte accounts registered to asus@mail.ru and many variations of this address under a different name. But none of those other profiles appear tied to real-life identities.

A mind map simplifying the research detailed here.

PANKOV

Constella’s data shows the email addresses asus2504@mail.ru and zaxar2504@rambler.ru used the rather unique password denis250485, which was also used by the email address denispankov@yandex.ru and almost a dozen variations at other Russian-language email providers.

Russian vehicle registration records from 2016 show the email address denispankov@yandex.ru belongs to Denis Viktorovich Pankov, born on April 25, 1985. That explains the “250485” portion of Pankov’s favored password. The registration records further indicate that in 2016 Pankov’s vehicle was registered in a suburb of Moscow.

Russian incorporation records show that denispankov@yandex.com is tied to IP Pankov Denis Viktorovich, a now-defunct transportation company in the Volograd Oblast, a region in southern Russia that shares a long border with western Kazazkhstan.

More recent records for IP Pankov Denis Viktorovich show a microenterprise with this name in Omsk that described its main activity as “retail sale by mail or via the Internet.” Russian corporate records indicate this entity was liquidated in 2021.

A reverse password search on “denis250485” via Constella shows this password was used by more than 75 email addresses, most of which are some variation of gaihnik@mail.ru — such as gaihnik25@mail.ru, or gaihnik2504@rambler.ru.

In 2012, someone posted answers to a questionnaire on behalf of Denis Viktorovich Pankov to a Russian-language discussion forum on Chinese crested dog breeds. The message said Pankov was seeking a puppy of a specific breed and was a resident of Krasnogorsk, a city that is adjacent to the northwestern boundary of Moscow.

The message said Pankov was a then 27-year-old manager in an advertising company, and could be reached at the email address gaihnik@mail.ru.

GAIHNIK

Constella Intelligence shows gaihnik@mail.ru registered at the now-defunct email marketing service Smart Responder from an address in Gagarin, which is about 115 miles west of Moscow.

Back in 2015, the user Gaihnik25 was banned from the online game World of Tanks for violating the game’s terms that prohibit “bot farming,” or the automated use of large numbers of player accounts to win some advantage that is usually related to cashing out game accounts or inventory.

For the past few years, someone using the nickname Gaihnik25 has been posting messages to the Russian-language hacking forum Gerki[.]pw, on discussion threads regarding software designed to “brute force” or mass-check online accounts for weak or compromised passwords.

A new member of the Russian hacking forum Nohide[.]Space using the handle Gaihnik has been commenting recently about proxy services, credential checking software, and the sale of hacked mailing lists. Gaihnik’s first post on the forum concerned private software for checking World of Tanks accounts.

The address gaihnik@mail.ru shows how so many email addresses tied to Pankov were also connected to apparently misleading identities on Vkontakte and elsewhere. Constella found this address was tied to a Vkontakte account for a Dmitriy Zakarov.

Microsoft’s Bing search engine says gaihnik@mail.ru belongs to 37-year-old Denis Pankov, yet clicking the Mail.ru profile for that user brings up a profile for a much older man by the name Gavril Zakarov. However, when you log in to a Mail.ru account and view that profile, it shows that most of the account’s profile photos are of a much younger man.

Many of those same photos show up in an online dating profile at dating.ru for the user Gaihnik, a.k.a “Denchik,” who says he is a 37-year-old Taurus from Gagarin who enjoys going for walks in nature, staying up late, and being on the Internet.

Mr. Pankov did not respond to multiple requests for comment sent to all of the email addresses mentioned in this story. However, some of those addresses produced detailed error responses; Mail.ru reported that the users panov-v@mail.ru, asus666@mail.ru, and asus2504@mail.ru were terminated, and that gaihnik25@mail.ru is now disabled.

Messages sent to many other email addresses connected via passwords to Pankov and using some variation of asus####@mail.ru also returned similar account termination messages.

Mastering the Art of SOC Analysis Part 1 | Fundamental Skills for Aspiring Security Operations Center Analysts

As cybersecurity threats increase in sophistication and frequency, the demand for skilled Security Operations Center (SOC) analysts continues to rise. In tandem with defensive strategies and advanced security software, SOC analysts fill a critical role in keeping enterprises safe from attacks.

SOC teams are responsible for identifying and mitigating oncoming threats, protecting sensitive information, and ensuring the overall security of an organization’s digital assets. As demand for skilled SOC analysts climbs, aspiring analysts need to ensure they have the technical knowledge, analytical skills, and critical thinking abilities required for the job.

This post is the first of three in a series covering the essential skills aspiring analysts should master as they embark on their journey toward success. In this post, we detail the first four key areas of study that lay the groundwork for mastery in the SOC analysis field.

1. Learn Network Architecture

Understanding the fundamental networking concepts is essential for SOC analysts. Start with the Open Systems Interconnection (OSI) model and the TCP/IP protocols basics.

Networking is the backbone of any IT infrastructure. For an aspiring SOC analyst, learning networking basics means understanding how data flows across the network; a skill critical in identifying and responding to security incidents.

By building a foundational understanding of networking concepts such as IP addressing, subnets, domain name system (DNS), routing, and protocols like TCP/IP, ICMP, and UDP, a SOC analyst can identify anomalies, track down malicious activity, and create effective security policies.

Since most attackers are initiated from the network, having a good grasp of network security fundamentals, including firewalls, intrusion detection and prevention systems (IDPS), and network segmentation provide SOC analysts with an edge in responding to security incidents. Understanding network fundamentals typically includes the below areas of interest:

  • Learn networking fundamentals – Learn about network topologies, addressing, protocols, and networking devices. Resources such as the CompTIA Network+ or Cisco CCNA certifications can provide a solid foundation in fundamental networking concepts.
  • Learn network security principles – Focus on firewalls, intrusion detection and prevention systems (IDPS), and virtual private networks (VPNs).
  • Practice with hands-on labs – Use virtual labs or physical equipment to gain hands-on experience in configuring and troubleshooting networks. Examples include:
    • GNS3 – This free, open-source network simulation software allows users to design, configure, and test virtual networks.
    • Packet Tracer – This network simulation software developed by Cisco allows users to design, configure, and test network topologies.
    • EVE-NG – This network emulation software allows users to design, configure, and test virtual networks and complex network configurations.
    • TryHackMe – This platform provides guided, pre-configured labs accessible through a browser. The variety of high-quality courses and their low entry barrier allow learners to gain exposure to different tools and concepts.
  • Join networking and security communities – Connect with professionals in the networking and security industry to learn from their experience, ask questions, and gain insights into the latest trends and technologies. Online communities such as Reddit’s /r/networking or /r/netsec, or professional associations such as ISACA, ISSA, or (ISC)², can be a great resource for connecting with others in the field.
  • Stay up-to-date with industry news – Follow security and networking news sites such as Dark Reading, BleepingComputer, or SecurityWeek to stay informed on the latest security threats and trends.

2. Learn Network Analysis

Analyzing network traffic can help identify suspicious activities and potential threats. Learn to use network analysis tools like Wireshark, Network Miner, and Snort.

Network traffic analysis involves examining the packets of data transmitted between devices on a network to identify patterns, anomalies, and signs of malicious activity. SOC analysts can detect suspicious behaviors such as unauthorized access attempts, data exfiltration, malware infections, and command-and-control communication by analyzing network traffic.

They can also use network traffic analysis to trace the origin of an attack, determine the scope of compromise, and identify affected assets. Network traffic analysis skills are key for any aspiring SOC analyst looking to build proficiency in threat detection and incident response. To get started on learning how to analyze network traffic, consider the below steps:

  • Build up networking basics – Before analyzing network traffic, it is essential to have a solid understanding of networking concepts such as TCP/IP, DNS, HTTP, and SSL. Learn to interpret a packet’s structure and each header field’s role can help identify and troubleshoot network issues.
  • Use network analysis tools – Various network analysis tools can help analyze network traffic, such as Wireshark, tcpdump, and tshark. These tools can be used to capture, decode, and analyze packets in real time or from saved capture files. Using Wireshark, for example, analysts can filter traffic by IP address, protocol, port, or keyword and analyze packet contents such as payload, headers, and timestamps.
  • Practice analyzing network traffic – The best way to improve network traffic analysis skills is by practicing on real-world network traffic data. Sample capture files are obtainable from online resources such as the Wireshark Sample Captures page or by capturing traffic on a test network. Use the traffic to simulate an attack and create detection rules using a NIDS-like snort.
  • Learn from online resources – Various online resources provide tutorials, blogs, and videos on network traffic analysis, such as the Wireshark University, PacketTotal, and the SANS Institute. These resources can help budding analysts learn advanced techniques like protocol analysis, network forensics, and malware analysis.

3. Learn Log Analysis

SOC analysts deal with a large volume of logs from different sources. Understanding how to parse, search, and analyze logs is crucial. The aspiring analyst must be comfortable using log management tools such as Splunk, ELK, and Graylog.

To be effective in their role, SOC analysts need to show proficiency in log analysis. Logs are a critical information source containing a wealth of data about system and network activity, user behavior, and security events. By analyzing logs, SOC analysts can identify suspicious activity, track the spread of malware, and detect potential security incidents.

Log analysis also plays a crucial role in incident response. When a security incident occurs, SOC analysts must investigate it, determine its scope and impact, and identify the root cause. Data captured in logs can help SOC analysts reconstruct the incident timeline, identify the attacker’s entry point, and determine the extent of the compromise.

Analyzing logs will also be required for any in-depth forensic investigations. The analysis involves examining logs generated by various systems and applications to detect anomalies, suspicious activities, and signs of compromise. Experienced analysts can detect events such as failed login attempts, unusual network traffic, and system changes that may indicate a security incident. Below are some methods aspiring analysts can take to improve their log analysis skills:

  • Become familiar with log management tools – Log management tools like Splunk, ELK, and Graylog can help analysts to parse, search, and analyze logs. These tools can collect logs from different sources, apply filters and transformations, and visualize log data. Use these tools to view the organization’s security posture comprehensively.
  • Learn common log formats – Logs come in a variety of formats. Learning common log formats like Syslog, Apache, and Windows Event Logs will serve to develop a stronger understanding of log data and how to make sense of it.
  • Study log analysis, parsing, and search techniques – SOC analysts must have a wide arsenal of knowledge on log analysis techniques such as anomaly detection, correlation analysis, and threat hunting. Also, practice parsing and searching logs with different log management tools and techniques.
  • Use regular expressions (Regex) – Regular expressions (regex) are a powerful tool for parsing and searching log data, allowing analysts to extract specific information from logs quickly.
  • Filter noise – Logs may contain a lot of noise, such as debug messages, informational messages, or system messages. Filtering out noise helps analysts focus on the essential log data only.
  • Use visualization tools – Visualization tools like graphs, charts, and dashboards are useful when trying to understand log data quickly. Utilize any visualization features within log management tools to create graphs or dashboards that show trends or anomalies in log data.
  • Stay updated on threat news – Cybersecurity threats and attack techniques constantly evolve. Stay in the know with the latest cybersecurity news and trends. Follow industry blogs, attend webinars, and participate in online communities to stay informed.

4. Learn Endpoint Analysis

Endpoints are a prime target for attackers, and SOC analysts need to understand how to secure them. Learn how to use endpoint security tools like Wazuh, OSSEC, and SentinelOne.

In today’s digital landscape, cybercriminals are continually devising new ways to exploit vulnerabilities and launch attacks, and the traditional perimeter-based security model is no longer enough. Security operations centers (SOCs) are at the forefront of identifying and mitigating these threats, and SOC analysts need to be familiar with a variety of tools and techniques to protect their organization’s network and sensitive data. Among these, one of the most critical tools that SOC analysts need to master is endpoint security tools.

Endpoint security tools protect against cyberattacks, focusing on securing endpoints like laptops, desktops, mobile devices, and servers. The endpoint is where an attack usually occurs, and it’s also the entry point for malware and other cyber threats. Endpoint security tools help to identify, isolate, and remediate the threat before it can cause significant damage.

Endpoint security tools in the hands of a knowledgeable SOC analyst can do the following:

  • Protect vulnerable endpoints – Attacks on endpoints can result in data breaches, system disruption, and other security incidents. Endpoint security tools help to protect against these attacks by providing real-time visibility and control over devices.
  • Perform advanced threat detection – Endpoint security tools use advanced threat detection mechanisms like behavioral analysis, machine learning, and artificial intelligence to detect and respond to threats. These tools can identify and isolate suspicious activities, providing SOC analysts with the information they need to respond to incidents quickly.
  • Increase visibility – Endpoint security tools provide SOC analysts with a complete view of endpoint devices, including their applications and processes. This visibility allows analysts to identify vulnerabilities and misconfigurations that cybercriminals could exploit.
  • Save time – Endpoint security tools can automate and orchestrate response actions, reducing the time it takes to detect and respond to incidents. This automation helps SOC analysts to focus on high-priority incidents, improving the overall efficiency and effectiveness of the SOC.

There are several endpoint security tools that SOC analysts need to master to protect their organization’s network and sensitive data. The most important of these are:

  • Endpoint Detection and Response (EDR)EDR solutions provide real-time visibility into endpoint devices, enabling SOC analysts to quickly detect and respond to incidents. EDR solutions use advanced threat detection mechanisms like behavioral analysis and machine learning to identify and isolate suspicious activities.
  • Antivirus & Anti-Malware – These can help to protect against known threats. These tools use signature-based detection to identify and block known malware and viruses.
  • Vulnerability Scanners – These tools scan endpoint devices for vulnerabilities and provide SOC analysts with a list of vulnerabilities that need to be addressed.
  • Patch Management Tools – These are vital to keeping endpoint devices up to date with the latest security patches and updates. These tools protect endpoint devices against known or so-called “N-day” vulnerabilities.

Conclusion

The path to mastering the art of SOC analysis begins with these fundamental skills, but it does not end there. In Part 2 of this series, we will cover how analysts can develop further and explore more advanced topics including cloud computing, Active Directory, threat hunting and malware detection.

Armed with a solid understanding of these concepts, new and developing analyts can rapidly learn how to detect intrusions and isolate them before they move deep into a sensitive environment and create long-lasting damage.

A trained and experienced SOC analyst is an invaluable component of today’s cybersecurity defense. To build on the skills we’ve discussed in this post, look out for the next part of this series by subscribing to our email list or following us on social media.

SentinelOne offers robust Managed Detection & Response (MDR), Managed Threat Hunting (MTH), Compromise Assessment and Incident Response Services. To learn more contact us or visit SentinelOne Global Services.

Services & Support | At a Glance
SentinelOne offers a breadth of services to set you up for success at every step, augment your security operations with expert help, and get support when and where you need it.

The Good, the Bad and the Ugly in Cybersecurity – Week 15

CVE-2023-21554 | Windows Admins Urged to Patch RCE Bug in MSMQ Service

A critical vulnerability included in this month’s Patch Tuesday roundup has caught the eye of cybersecurity researchers for its role in exposing hundreds of thousands of systems to attack. Dubbed “QueueJumper”, CVE-2023-21554 is found in Window’s Message Queuing (MSMQ) middleware service available on all Windows operating systems.

MSMQ technology is used by applications running at different times to communicate across networks and systems that may be temporarily offline. MSMQ works by effectively routing and securing messages, guaranteeing priority-based message delivery. In the hands of an attacker, CVE-2023-21554 enables unauthenticated remote code execution (RCE) on unpatched Windows servers through specially crafted malicious MSMQ packets.

Though it is an optional Windows service not enabled by default, it is often on in the background when installing enterprise apps and remains on even after uninstalling. Researchers note that more than 360,000 Internet-exposed servers running the MSMQ service are potentially vulnerable to attack, not including those that are not connected via Internet.

Though MSMQ sees low usage and has been end-of-lifed to make way for newer products like Azure Queue, it is still easily enabled via the Control Panel or PowerShell. Given the fact that this type of vulnerability is especially attractive to threat actors, it has been given an “exploitation more likely” tag referring to Microsoft’s exploitability index. Such RCE vulnerabilities are commonly used for initial access and malware deployment so require immediate attention.

Microsoft advises Windows administrators to disable the MSMQ service until the patch can be applied. Admins can also check to see if there is a service name “Message Queuing” running and if TCP port 1801 is listening on the machine.

Credential Theft | Legion Hacking Tool Circulates on Telegram

Researchers this week have reported on a new Python-based hacking tool and credential harvester named “Legion” that is snaking its way from buyer to buyer on Telegram. According to reports, the tool allows threat actors to break into various online services for further exploitation.

The Legion splash screen (Source: Cado Security)

Reports indicate that Legion’s primary means of attack compromises misconfigured web servers running content management systems (CMS), PHP, or PHP-based frameworks. Once installed, Legion has been found to enumerate vulnerable SMTP servers, perform RCE attacks, exploit unpatched versions of Apache, brute-force cPanel and WebHost Manager (WHM) accounts, and abuse various AWS services.

The toolset then steals credentials from web services such as email providers, cloud services, server management systems, payment platforms, and databases. Other than extracting credentials, it can also implant webshells, create admin users accounts, and send SMS spam messages across customers of all U.S. telecom carriers.

Legion is also described as a modular malware, bearing resemblance to AndroxGh0st – a similar malware family first discovered in December of 2022. Security experts on the SentinelLabs team recently revealed that AndroxGh0st is part of a comprehensive toolset called AlienFox sold to actors intent on stealing API keys and cloud service secrets.

The development and use of cloud-focused toolkits for spamming and harvesting credentials are rising in popularity with cyber attackers. Multi-purpose credential harvesting tools will continue to be a major risk for any enterprises housing misconfigured or poorly managed web servers.

Transparent Tribe | Nation-State Adversary Targets Indian Education Sector

Suspected Pakistani-based hacking group known as Transparent Tribe has been linked to a series of attacks on the Indian education sector distinguished by its use of weaponized Microsoft Office documents to stage Crimson RAT malware. Also known in the cybersecurity community as APT36, Operation C-Major, PROJECTM, and Mythic Leopard, the group has been active since 2013 but has only recently set its sights on targeting schools since late 2021 before focusing on the Indian military and government sectors.

The Crimson RAT malware is capable of exfiltrating files and system data to servers controlled by the threat actor. Further, it captures screenshots, stops running processes, and executes additional payloads to log keystrokes and steal browser credentials. SentinelLab’s latest report details findings pertaining to the cluster of Office documents used by Transparent Tribe to contain the Crimson RAT malware.

The documents have been seen making use of OLE embedding to stage the malware. Needing users to double-click a malicious element in the document, the documents distributed by Transparent Tribe trick users to perform the action by displaying a ‘View Document’ prompt, as if to unlock the document’s content. Double-clicking then activates the OLE package that stores and deploys the Crimson RAT, which is masqueraded as an update.

Transparent Tribe malicious document
Transparent Tribe malicious document

Based on the associated domains and use of Crimson RAT, cyber researchers at SentinelLabs note that the recent series of attacks on the Indian educational vertical are likely part of a previously reported campaign by the same actors. This suggests that Transparent Tribe is a highly motivated and persistent threat actor that operates by regularly updating their targeting strategies, malware arsenal, and operational playbook.