Cybersecurity News: GobRAT targets Linux, RPMSG messages exploited, Augusta Georgia cyberattack

New GobRAT remote access trojan targeting Linux routers in Japan

This is a new Golang remote access trojan (RAT) called GobRAT. “Initially, the attacker targets a router whose WEBUI is open to the public, executes scripts possibly by using vulnerabilities, and finally infects the GobRAT,” the JPCERT Coordination Center (JPCERT/CC) said in a report published yesterday. Once the internet-exposed router is compromised, a loader script deploys that acts as a conduit for GobRAT, which, when launched, masquerades as the Apache daemon process to evade detection. The loader is also able to disable firewalls, while GobRAT communicates with a remote server via the Transport Layer Security (TLS) protocol to receive as many as 22 different encrypted commands for execution.

(The Hacker News)

Attackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacks

Researchers at Trustwave are warning of threat actors who are using encrypted RPMSG attachments sent via compromised Microsoft 365 accounts in a phishing campaign aimed at stealing Microsoft credentials. RPMSG files deliver emails with Rights-Managed Email Object Protocol enabled. According to Security Affairs, “This protocol controls e-mail access and usage permissions. Instead of a plain text, e-mails via RPMSG files are sent with content encrypted and stored as encrypted file attachment.” The recipients then read the encrypted messages after being authenticated with their Microsoft account or obtaining a one-time passcode. With this attack, the message attempts to trick recipients into clicking the “Read the message” button to decrypt the protected message after which, the recipients are redirected to an Office 365 webpage to sign into their Microsoft account. Once authenticated, the victims are redirected to a page displaying the attackers’ phishing email.

(Security Affairs)

Hackers hold city of Augusta hostage in a ransomware attack

A ransomware attack on the city of Augusta, Georgia is apparently the work of the BlackByte group, who has claimed responsibility. The group has posted 10GB of sample data and states they have a much more available, including payroll information, contact details, PII, physical addresses, budget allocation data, and more, although this has not been independently verified. The group accuses the city of being “sleepy” in its response, and is posting the sample files, to help it “wake up.” Augusta’s mayor has refuted the claims about the ransom demand.

(CSO Online)

MCNA Dental data breach impacts 8.9 million people after ransomware attack

Managed Care of North America (MCNA) Dental, one of the largest government-sponsored (Medicaid and CHIP) dental care and oral health insurance providers in the U.S., has announced a data breach notification on its website. Almost 9 million patients may have had their personal data compromised. MCNA said on Friday that it became aware of “unauthorized access to its computer systems” on March 6th, and further investigation showed that that the hackers first obtained access to its network on February 26th. On March 7, the LockBit ransomware gang announced responsibility for the attack, publishing samples of stolen data.

(Bleeping Computer)

Thanks to this week’s episode sponsor, Barricade Cyber Solutions

Have you fallen victim to a ransomware attack? Don’t worry! Barricade Cyber Solutions has helped thousands of customers in situations just like yours. Their proprietary ransomware recovery services are designed to quickly get your business back on track. Their team of experts will identify the source of the attack and provide a comprehensive solution to prevent it from happening again. You can count on them for the security of your data and systems. Visit barricadecyber.com

Brazilian hackers target Portuguese financial institutions

A hacking organization from Brazil has targeted customers of more than 30 Portuguese financial institutions this year, according to a report released Thursday by SentinelLabs. The campaign, dubbed Operation Magalenha, initially used cloud service providers like DigitalOcean and Dropbox, but as these firms tightened rules on how their services are used, it moved web hosting provider TimeWeb, based in Russia. The group uses a pair of backdoors “deployed simultaneously to give the attacker control over infected machines.” This technique has been named “PeepingTitle,” since the backdoors allow the attackers to keep an eye on window interaction, as well as taking screenshots, terminating processes and deploying additional malware such as data exfiltration tools.

(Cyberscoop)

Barracuda Networks issue added to CISA vulnerability list

On Friday, a bug that had been recently patched recently in Barracuda Networks’ email security hardware, was added to the federal catalog of exploited vulnerabilities. The company had pushed out two separate patches to its Email Security Gateway (ESG) appliance to fix a flaw “in a module which initially screens the attachments of incoming emails.” CISA warned that the bug, now tracked as tracked as CVE-2023-2868 and vulnerabilities like it, are frequent attack vectors for malicious cyber actors and pose significant risks. No other Barracuda Networks products were affected, the company said.

(The Record)

Lender OneMain fined $4.25 million for cybersecurity lapses

OneMain Financial Group specializes in issuing loans to people with “non-prime” credit histories. It must now pay a $4.25 million penalty for cybersecurity lapses that were found during a government investigation. According to The Record, The Department of Financial Services (DFS) investigation found that OneMain Financial “allowed local administrative users to share accounts and permitted those accounts to use the default password that users got when they were onboarded.” The DFS also noted it used a “non-formalized project administration framework developed in-house that failed to address certain key software development life cycle phases, it did not assess third-party vendors properly, despite having a risk policy in place, and further failed to appropriately adjust several vendors’ risk scores even after the occurrence of multiple cybersecurity events. OneMain has responded by saying it has “long since addressed” problems found in the investigation, which examined its policies from 2017 to early 2020.

(The Record)

Last week in ransomware

As mentioned earlier in this episode, Augusta, Georgia has joined Dallas on the list of cities being subject to cyberattack. BlackBasta waged an attack on German arms manufacturer Rheinmetall and ABB confirmed that data was stolen during an attack earlier this month. Reports released by security firms and researchers include the ALPHV/BlackCat ransomware gang is now using the malicious POORTRY Windows kernel driver, Iranian hackers have created a new Moneybird ransomware to attack Israeli organizations, a new Buhti ransomware operation is using the leaked LockBit and Babuk encryptors, and ransomware affiliate Bassterlord released a “slightly” edited but highly sought-after version of his ransomware manual version 2.0 that was being sold for $10,000 on hacker forums.

(Bleeping Computer and Cyber Security Headlines)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.