Within the ever-evolving cybersecurity panorama, 2023 witnessed a dramatic surge within the sophistication of cyber threats and malware. AT&T Cybersecurity Alien Labs reviewed the large occasions of 2023 and the way malware morphed this 12 months to strive new methods to breach and wreak havoc.
This 12 months’s occasions saved cybersecurity specialists on their toes, from increasing malware variants to introducing new risk actors and assault methods. Listed below are a few of the most compelling developments, highlighting malware’s evolving capabilities and the challenges defenders face.
Highlights of the 12 months: Rising traits and notable incidents
Because the 12 months unfolded, a number of traits and incidents left an indelible mark on the cybersecurity panorama:
Exploiting OneNote for malicious payloads
Cybercriminals leveraged Microsoft OneNote to ship many malicious payloads to victims, together with Redline, AgentTesla, Quasar RAT, and others. This beforehand underutilized Workplace program turned a well-liked software attributable to its low suspicion and widespread utilization.
web optimization poisoning and Google Adverts
Malicious actors resorted to SEO poisoning tactics, deploying phishing hyperlinks by Google Adverts to deceive unsuspecting victims. These hyperlinks led to cloned, benign net pages, avoiding Google’s detection and remaining energetic for prolonged durations. Outstanding malware households, together with Raccoon Stealer and IcedID, capitalized on this technique.
Exploiting geopolitical occasions
Cybercriminals exploited the geopolitical climate, significantly the Center East battle, as a lure for his or her assaults. This development mirrored the earlier 12 months’s Ukraine-related phishing campaigns and crypto scams.
APTs: State-sponsored espionage continues to current challenges
Advanced Persistent Threats (APTs) continued to pose a major risk in 2023:
- Snake: CISA reported on the Snake APT, a sophisticated cyber-espionage software related to the Russian Federal Safety Service (FSB). This malware had been in use for almost 20 years.
- Volt Hurricane: A marketing campaign concentrating on crucial infrastructure organizations in the US was attributed to Volt Hurricane, a state-sponsored actor based mostly in China. Their focus lay on espionage and knowledge gathering.
- Storm-0558: This extremely refined intrusion marketing campaign, orchestrated by the Storm-0558 APT from China, infiltrated the e-mail accounts of roughly 25 organizations, together with authorities businesses.
Ransomware’s relentless rise
Ransomware remained a prevalent and profitable risk all year long:
- Cuba and Snatch: Ransomware teams like Cuba and Snatch focused crucial infrastructure in the US, inflicting concern for nationwide safety.
- ALPHV/BlackCat: Past web optimization poisoning, this group compromised the pc methods of Caesar and MGM casinos. Additionally they resorted to submitting complaints with the US Securities and Trade Fee (SEC) in opposition to their victims, making use of further strain to pay ransoms.
- Exploiting new vulnerabilities: Cybercriminals wasted no time exploiting newly found vulnerabilities, similar to CVE-2023-22518 in Atlassian’s Confluence, CVE-2023-4966 (Citrix bleed), and others. These vulnerabilities turned gateways for ransomware assaults.
- Evolving ransomware households: New ransomware variants like Trash Panda emerged whereas current households tailored to focus on Linux and ESXi servers, additional increasing their attain.
Notable blogs of the 12 months
1. BlackGuard: Elevating Malware-as-a-Service
One of many 12 months’s standout tales was the evolution of BlackGuard, a formidable Malware-as-a-Service (MaaS) supplied in underground boards and Telegram channels. This insidious software underwent a major improve, amplifying its capabilities. Already identified for its capability to pilfer delicate information from browsers, video games, chats, and cryptocurrencies, the brand new BlackGuard variant upped the ante.
BlackGuard improved its Anti-Reversing and Sandboxing capabilities, making it much more elusive to safety specialists. Furthermore, it may now tamper with cryptocurrency wallets copied to the clipboard. This enhancement posed a extreme risk to cryptocurrency lovers and buyers. Moreover, BlackGuard included superior Loader capabilities, enabling it to propagate by shared or detachable gadgets and masks its communications by way of private and non-private proxies or the nameless Tor community.
2. SeroXen: A RAT’s fast ascent and fall
In a coincidence, 2023 witnessed the meteoric rise and fall of SeroXen, a brand new variant of the Quasar Distant Entry Trojan (RAT). This modified department of the open-source RAT added important modifications to its authentic framework, enhancing its capabilities.
SeroXen achieved fast notoriety, with a whole lot of samples recognized inside the first few months of the 12 months. Nonetheless, shortly after the weblog highlighting its emergence was revealed, the SeroXen web site introduced its shutdown and applied a kill-switch, rendering contaminated PCs ineffective to malicious actors. It was a uncommon occasion the place the publication of analysis inadvertently led to the downfall of a malware software.
3. AdLoad: Mac methods was proxy servers
AT&T Cybersecurity Alien Labs uncovered a devious malware marketing campaign involving AdLoad. This malware ingeniously reworked customers’ Mac methods into proxy servers, then offered to 3rd events, together with some with illicit functions. The risk actor behind AdLoad contaminated goal methods surreptitiously put in a proxy utility within the background.
These contaminated methods had been subsequently supplied to proxy corporations, portraying themselves as reputable entities. Consumers exploited the advantages of those residential proxy botnets, having fun with anonymity, extensive geographical availability, and excessive IP rotation for conducting nefarious actions, together with SPAM campaigns.
Following the publication of the analysis weblog, the same marketing campaign concentrating on Home windows methods emerged. The modus operandi mirrored that of the Mac model however was tailor-made for Home windows OS, considerably increasing the potential goal pool and the affect of the proxy community.
4. AsyncRAT: The persistent phishing risk
AT&T Alien Labs is the risk intelligence unit of AT&T Cybersecurity. We assist gas our cybersecurity consulting and managed safety providers with probably the most up-to-date risk intelligence data. We work with the Open Threat Exchange (OTX) to supply actionable and community-powered risk information. Watch the AT&T Cybersecurity weblog for extra observations and analysis from the Alien Labs workforce.