Fwd: Virus Alert : WastedLocker Ransomware

1 year ago 81

Virus Alert 

WastedLocker Ransomware

It has been reported that a new ransomware, named as "WastedLocker" is

spreading. The attack is mainly focused on U.S. located organizations of

various industries including manufacturing, media, IT, healthcare and many

more. The ransomware attack is attributed to infamous cybercriminal outfit

"Evil Corp" that was earlier linked to some other dreadful

cyber-attacks also.

Infection Mechanism:

The infection mechanism starts with a malicious JavaScript-based framework

known as "SocGholish" delivered in a zipped file to the victim while

visiting a compromised legitimate website. As reported, at least 150

compromised websites have been discovered. The zipped file contains

malicious JavaScript, masquerading as browser update. Another JavaScript

profiles the computer using various commands like whoami, net user, and net

group and PowerShell is used to download additional scripts.

The next pivotal stage in this attack is to download and execute a loader

from a domain being used to deliver Cobalt Strike threat emulation

software. The loader also contains .NET injector. The injected payload,

known as Cobalt Strike Beacon, can be used to inject other processes and

along with several other tools it can steal credentials, escalate

privileges, and move across the network. Attackers also search all computer

objects in Active Directory database to locate Windows servers and hosts.

Cobalt Strike is also used for credential dumping using "ProcDump".

Before deploying ransomware, attackers disable Windows Defender across

victim's entire network using PowerShell scripts and legitimate tools.

When all the payloads are deployed successfully, Windows Defender is

disabled and services across the organization are stopped, Windows

Sysinternals tool "PsExec" is used to launch WastedLocker ransomware

itself that encrypts the victim's data and deletes Windows shadow volumes

to wipe backups and file snapshots to make recovery impossible.

The threat actors behind this attack are highly experienced and this attack

on victim's network if unidentified and not addressed, can cause

substantial damage.

IOC:

IP Address:

185.189.151.38

185.162.235.167

185.82.127.38

195.123.227.225

38.135.104.189

88.119.175.104

91.219.237.36

91.236.116.63

Domain:

sodality[d0t]mandmsolicitorscom

advokat-hodonin[d0t]info/gate[d0t]php

penaz[d0t]info/gate[d0t]php

lgrarcosbann[d0t]club/index[d0t]php

cofeedback[d0t]com

consultane[d0t]com

feedbackgive[d0t]com

msoftwares[d0t]info

mwebsoft[d0t]com

net-giftshop[d0t]info

rostraffic[d0t]com

traffichi[d0t]com

typiconsult[d0t]com

websitesbuilder[d0t]info

backup[d0t]awarfaregaming[d0t]com

click[d0t]clickanalytics208[d0t]com

connect[d0t]clevelandskin[d0t]com

connect[d0t]clevelandskin[d0t]net

connect[d0t]clevelandskin[d0t]org

cushion[d0t]aiimss[d0t]com

link[d0t]easycounter210[d0t]com

rocket2[d0t]new10k[d0t]com

track[d0t]positiverefreshment[d0t]org

Hashes:

Kindly visit the URL:

stedlocker-ransomware-us

Countermeasures and Best practices for prevention:

Maintain appropriate Firewall policies to block malicious traffic entering

the system/network. Enable a personal firewall on workstation.

Keep updated Antivirus/Antimalware software to detect any threat before it

infects the system/network. Always scan the external drives/removable

devices before use. Leverage anti-phishing solutions that help protect

credentials and against malicious file downloads.

It is also important to keep web filtering tools updated.

Block the IP addresses of known malicious sites to prevent devices from

being able to access them. Activate intelligent website blacklisting to

block known bad websites.

Use limited privilege user on the computer or allow administrative access

to systems with special administrative accounts for administrators.

Block websites hosting JavaScript miners both at the gateway and the

endpoints.

Keep software and OS up-to-date so that attackers may not take advantages

of or exploit known vulnerabilities.

Change default login credentials as they are readily available with

attackers.

Avoid downloading files from untrusted websites.

Go beyond intrusion detection to protect servers with runtime memory

protection

for critical applications and server workloads, ensuring a defense against

actors who already have a grip on your server.

Disable Autorun and Autoplay policies.

Consider using application whitelists to prevent unknown executables from

launching autonomously.

Delete the system changes made by the malware such as files created/

registry entries /services etc.

Monitor traffic generated from client machines to the domains and IP

address mentioned in Installation section.

Disable unnecessary services on agency workstations and servers.

References:

stedlocker-ransomware-us

ed-in-wastedlocker-ransomware-attacks/

ant-developed-by-the-evil-corp-group/

Read Entire Article