US-CERT- Increased Truebot Activity Infects U.S. and Canada Based Networks

Started by Netwörkheäd, July 06, 2023, 12:07:13 PM

Previous topic - Next topic

Netwörkheäd

Increased Truebot Activity Infects U.S. and Canada Based Networks

[html]

SUMMARY


The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Canadian Centre for Cyber Security (CCCS) are releasing this joint Cybersecurity Advisory (CSA) in response to cyber threat actors leveraging newly identified Truebot malware variants against organizations in the United States and Canada. As recently as May 31, 2023, the authoring organizations have observed an increase in cyber threat actors using new malware variants of Truebot (also known as https://malpedia.caad.fkie.fraunhofer.de/details/win.silence" title="Silence">Silence.Downloader). Truebot is a botnet that has been used by malicious cyber groups like https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a" title="#StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability">CL0P Ransomware Gang to collect and exfiltrate information from its target victims.


Previous Truebot malware variants were primarily delivered by cyber threat actors via malicious phishing email attachments; however, newer versions allow cyber threat actors to also gain initial access through exploiting CVE-2022-31199—(a remote code execution vulnerability in the Netwrix Auditor application), enabling deployment of the malware at scale within the compromised environment. Based on confirmation from open-source reporting and analytical findings of Truebot variants, the authoring organizations assess cyber threat actors are leveraging both phishing campaigns with malicious redirect hyperlinks and CVE-2022-31199 to deliver new Truebot malware variants.


The authoring organizations recommend hunting for the malicious activity using the guidance outlined in this CSA, as well as applying vendor patches to Netwrix Auditor (version 10.5—see Mitigations section below).[https://bishopfox.com/blog/netwrix-auditor-advisory" title="Netwrix Auditor Advisory">1] Any organization identifying indicators of compromise (IOCs) within their environment should urgently apply the incident responses and mitigation measures detailed in this CSA and report the intrusion to CISA or the FBI.


Download the PDF version of this report:






   

    https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks.pdf" class="c-file__link" target="_blank">AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks
    (PDF,       869.59 KB
  )

 


Read the associated Malware Analysis Report https://www.cisa.gov/news-events/analysis-reports/ar23-187a" title="MAR-10445155-1.v1 Truebot Activity Infects U.S. and Canada Based Networks">MAR-10445155-1.v1 Truebot Activity Infects U.S. and Canada Based Networks

Let's not argue. Let's network!