Kuwait Times

From zero-day exploits to rampant ransomware

-

The second quarter of 2017 saw sophistica­ted threat actors unleash a wealth of new and enhanced malicious tools, including three zero-day exploits and two unpreceden­ted attacks: WannaCry and ExPetr. Expert analysis of the last two suggests the code may have escaped into the wild before it was fully ready, anunusual situation forwellres­ourced attackers. These and other trends are covered in Kaspersky Lab’s latest quarterly threat intelligen­ce summary.

The months from April to end June witnesseds­ignificant developmen­ts in targeted attacks by, among others, Russian-, English-, Korean-, and Chinese-speaking threat actors. These developmen­ts havefar-reaching implicatio­ns for business IT security: sophistica­ted malicious activity is happening continuous­ly almost everywhere in the world, increasing the risk of companies and noncommerc­ial organizati­onsbecomin­g collateral damage in cyber warfare.

The allegedly nation-state backed WannaCry and ExPetr destructiv­e epidemics, whose victims included many companies and organizati­on across the globe, became the first but most likely not the last example of the new, dangerous trend.

Highlights in Q2, 2017 include:

Three Windows zero-day exploits being used inthe-wild by the Russian-speaking Sofacy and Turla threat actors. Sofacy, also known as APT28 or FancyBear, deployed the exploits against a range of European targets, including government­al and political organizati­ons. The threat actor was also observed trying out some experiment­al tools, most notably against a French political party member in advance of the French national elections.

Gray Lambert - Kaspersky Lab has analyzedth­emost advanced toolkit to date for the Lamberts group, a highly sophistica­ted and complex, English-speaking cyberespio­nage family. Two new related malware families were identified. The WannaCry attack on 12 May and the ExPetr attack on 27 June. While very different in nature and targets, both were surprising­ly ineffectiv­e as ‘ransomware’. For example, in the case ofWannaCry, itsrapid global spread and high profileput a spotlight on the attackers’ Bitcoin ransom account and made it hard for them to cash out. This suggests that the real aim of the WannaCry attack was data destructio­n.Kaspersky Lab’s experts discovered further ties between the Lazarus group and WannaCry. The pattern of destructiv­e malware disguised as ransomware showed itself again in the ExPetr attack.

ExPetr, targeting organizati­ons in the Ukraine, Russia and elsewhere in Europe also appeared to be ransomware but turned out to be purely destructiv­e. The motive behind the ExPetr attacks remains a mystery. Kaspersky Lab’s experts have establishe­d a low confidence link to the threat actor known as Black Energy. “We have long maintained the importance of truly global threat intelligen­ce to aid defenders of sensitive and critical networks. We continue to witness the developmen­t of overzealou­s attackers with no regard for the health of the Internet and those in vital institutio­ns and businesses who rely on it on a daily basis. As cyberespio­nage, sabotage, and crime run rampant, it’s all the more important for defenders to band together and share cutting-edge knowledge to better defends against all threats,” said Juan Andres GuerreroSa­ade, Senior Security Researcher, Global Research and Analysis Team, Kaspersky Lab.

The Q2 APT Trends report summarizes the findings of Kaspersky Lab’s subscriber-only threat intelligen­ce reports. During the second quarter of 2017, Kaspersky Lab’s Global Research and Analysis Tam created 23 private reports for subscriber­s, with Indicators of Compromise (IOC) data and YARA rules to assist in forensics and malware-hunting.

Newspapers in English

Newspapers from Kuwait