enterprise

welcome to

White Papers

macOS Threat Landscape Report

macOS Threat Landscape Report

Data gathered annually by Bitdefender shows that Mac users are mainly targeted by three key threats: Trojans, Adware and Potentially Unwanted Applications (PUAs). While named differently, these hazards share one trait: they require victims to manually run the threat, meaning their authors try hard to make their malware look like legitimate applications.
2022 was no different, as most malware infections on Macs were predictably spread across these three categories of threats.

READ MORE

Abusing the Ad Network – Threat Actors Now Hacking into Companies via Search

Abusing the Ad Network – Threat Actors Now Hacking into Companies via Search

For the past few years, hackers have increasingly targeted customers and businesses with tainted software boosted via ads. The recipe is simple – cyber-criminal groups set up fake websites for high-interest software and promote them on top of the results page through advertisements.

It takes just one search and one click for a user to fall victim to the trick. Testament to that is the series of attacks against prominent crypto-currency figures earlier in 2023 as well as a recent spate of incidents Bitdefender investigated in the second part of the year.

READ MORE

Vulnerabilities identified in Amazon Fire TV Stick, Insignia FireOS TV Series

Vulnerabilities identified in Amazon Fire TV Stick, Insignia FireOS TV Series

Amazon Fire TV devices have gained massive popularity among TV users as they provide a convenient interface
to transform any device, whether smart or dumb, into a fully connected device able to play local or cloud-delivered
content. The functionality that allows the device to receive media content from within the local area network, and (then)
play it on the TV is provided by a service named Amazon Fling Service. For applications that do not require a custom
media player, the built-in media receiver is used.

READ MORE

S1deload Stealer – Exploring the Economics of Social Network Account Hijacking

S1deload Stealer – Exploring the Economics of Social Network Account Hijacking

Social networks, which have grown to occupy a significant portion of our lives, have been abused by criminals since
their inception. With access to multiple legitimate social media accounts, threat actors have been able to extort
significant financial gains, or even manipulate public opinion and change the course of elections. On the everyday
level, financially motivated groups have created malvertising and spam campaigns and set up fully automated farms of
content-sharing websites to increase revenue or sell and rent compromised accounts to other malicious actors.

READ MORE

EyeSpy - Iranian Spyware Delivered in VPN Installers

EyeSpy - Iranian Spyware Delivered in VPN Installers

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe.

We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website.

READ MORE

Cyber-Espionage in the Middle East: Investigating a New BackdoorDiplomacy Threat Actor Campaign

Cyber-Espionage in the Middle East: Investigating a New BackdoorDiplomacy Threat Actor Campaign

Bitdefender researchers investigated a malicious campaign involving the abuse of binaries vulnerable to side-loading, targeting the Middle East. Analysis of the evidence shows that traces correspond to a cyber-espionage operation performed most likely by Chinese threat actor BackdoorDiplomacy against victims that we linked to activity in the telecom industry in the Middle East.

READ MORE

Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild

Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild

In this paper, we describe a crypto-jacking campaign in which the attackers exploit known DLL Side-Loading vulnerabilities in Microsoft OneDrive.

READ MORE

Vulnerabilities Identified in EZVIZ Smart Cams

Vulnerabilities Identified in EZVIZ Smart Cams

As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT
space. This report covers several camera models manufactured by EZVIZ.

READ MORE

Multiple Vulnerabilities in the Device42 Asset Management Appliance

Multiple Vulnerabilities in the Device42 Asset Management Appliance

Modern IT environments rely on automatic discovery, asset management and dependency mapping. Whether based on agents or completely agentless, these tools allow IT infrastructure managers to create
a complete inventory of networked devices, servers
and hypervisors, applications and more.
We performed a security assessment of the Device42
appliance. The findings are outlined in tis whitepaper.

READ MORE

Under Siege for Months: the Anatomy of an Industrial Espionage Operation

Under Siege for Months: the Anatomy of an Industrial Espionage Operation

Providing security to customers is a complex and resource-intensive endeavor in a complex world of deeply integrated technologies. As part of our commitment to keeping customers safe, we often complement our security stack offerings with managed detection and response, threat hunting and constant monitoring of customer infrastructure. The Cyber-Threat Intelligence Lab keeps a close eye on alerts and EDR reports coming from infrastructure, helping owners and maintainers navigate the early stages of compromise

READ MORE

RIG Exploit Kit Campaign Delivers Raccoon Stealer

RIG Exploit Kit Campaign Delivers Raccoon Stealer

The RIG Exploit Kit continues to spread malware via browser exploits, especially through vulnerable versions of Internet Explorer 11. One campaign earlier this year was delivering the Raccoon Stealer Trojan, which we will describe in this paper.

READ MORE

Bitdefender Consumer Threat Landscape Report 2021

Bitdefender Consumer Threat Landscape Report 2021

Digital activity has reached an all-time high during the pandemic, with careless consumer behavior further darkening the global cyberthreat landscape.

This report offers insight into how the consumer threat landscape has evolved in 2021 and includes developments on Windows, Mac OS, mobile, as well as IoT platforms.

READ MORE

Vulnerabilities Identified in Eufy 2K Indoor Camera

Vulnerabilities Identified in Eufy 2K Indoor Camera

This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT space. This report covers the Eufy 2K Indoor Camera and is
based on our research of the 2.0.9.3 firmware version.

READ MORE

Deep Dive Into RedLine Stealer

Deep Dive Into RedLine Stealer

At the start of the year, Bitdefender noticed a RIG Exploit Kit
campaign using CVE-2021-26411 exploits found in Internet Explorer to deliver RedLine Stealer. When executed, RedLine Stealer performs recon against the target system (including username, hardware, browsers installed, anti-virus software) and then exfiltrates data (including passwords, saved credit cards, crypto wallets, VPN logins) to a remote command and control server.

READ MORE

Vulnerabilities Identified in the Kwikset Halo Smart Lock

Vulnerabilities Identified in the Kwikset Halo Smart Lock

As the creator of the world’s first smart-home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper, part of a series developed in partnership
with Tom’s Guide, aims to shed light on the security of the world’s best-sellers in the IoT space.

READ MORE

Vulnerabilities Identified in Wyze Cam IoT Device

Vulnerabilities Identified in Wyze Cam IoT Device

At Bitdefender, we care deeply about security, so we’ve been working with media partners and IoT devices manufacturers to identify vulnerabilities in the world’s best-selling connected devices. As a leading vendor of cybersecurity protection across
endpoint and IoT devices, we have been assessing the security of smart-home equipment for more than half a decade. Our goal is to help vendors and customers stay on top of security and privacy blind spots and make the IoT ecosystem safer for everybody.

While looking into the Wyze Cam device, we identified several vulnerabilities that let an outside attacker access the camera feed or execute malicious code to further compromise the device.

READ MORE

Vulnerabilities identified in the Abode IOTA security system: Fake image injection into timeline

Vulnerabilities identified in the Abode IOTA security system: Fake image injection into timeline

Our research on the Abode iota All-In-One Security Kit revealed several vulnerabilities that allow an attacker to upload fake images into the timeline or to remotely execute malicious code on the device to hijack it.

READ MORE

Digitally-Signed Rootkits are Back – A Look at FiveSys and Companions

Digitally-Signed Rootkits are Back – A Look at FiveSys and Companions

For the past few months, Bitdefender researchers have seen a surge in malicious drivers with valid digital signatures issued by Microsoft through the WHQL signing process. This whitepaper documents FiveSys – a digitally signed rootkit that made its way
through the driver certification process.

READ MORE

Cracking the Maximus Answer DualCam Video Doorbell

Cracking the Maximus Answer DualCam Video Doorbell

Internet-connected doorbells with motion-sensing and notification capabilities have become extremely popular among smart home enthusiasts. Convenient and easy to use, they are often regarded as the first line of physical security defense, but these devices often end up exposing private customer information or granting attackers access to the customer network.

As the creator of the world’s first smart-home cybersecurity hub, Bitdefender constantly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper, part of a series developed in partnership with Tom’s Guide, aims to shed light on the security of the world’s
best-sellers in the IoT space.

READ MORE

Cracking the Victure IPC360 Monitor

Cracking the Victure IPC360 Monitor

While looking into the Victure IPC360 Camera, we have identified several vulnerabilities that let an outside attacker access the camera feed or disable encryption of streams stored on the cloud.

Additionally, an attacker sharing a network with the camera can enable the RTSP and ONVIF protocols or exploit a stack-based buffer overflow to completely hijack the device.

READ MORE

FIN8 Threat Actor Goes Agile with New Sardonic Backdoor

FIN8 Threat Actor Goes Agile with New Sardonic Backdoor

Since January 2016, FIN8 has been steadily building a reputation among financially motivated advanced threat
actors. Bitdefender researchers are constantly monitoring this group’s activity, and previous research released in early 2021 documented the use of a new, improved version of the BADHATCH backdoor.

This whitepaper focuses on the analysis of a new backdoor component dubbed Sardonic, that was discovered during a forensic investigation.

READ MORE

Debugging MosaicLoader One Step at a Time

Debugging MosaicLoader One Step at a Time

Bitdefender researchers have investigated a new malware strain spiking in telemetry. We named it MosaicLoader because of the intricate internal structure that aims to confuse malware analysts and prevent reverse-engineering.

MosaicLoader is seemingly delivered through paid ads in search results designed to lure users looking for cracked software to infect their devices. Once planted on the system, the malware creates a complex chain of processes and tries to download a variety of threats, from simple cookie stealers, crypto-currency miners to fully-fledged backdoors such as Glupteba.

READ MORE

A Fresh Look at Trickbot’s Ever-Improving VNC Module

A Fresh Look at Trickbot’s Ever-Improving VNC Module

The journey of Trickbot starts almost half a decade ago, when it appeared in the form of a banker and credential-stealing application. Drawing inspiration from Dyre (or Dyreza), Trickbot consists of an ecosystem of plugin modulesand helper components.

This new research focuses on an updated VNC module, which includes new functionalities for monitoring and intelligence gathering.

READ MORE

The Ultimate Guide to AV and EDR Independent Tests

The Ultimate Guide to AV and EDR Independent Tests

Whether you’re busy running your own business or you’re leading a small team of IT professionals, your plate is full. You don’t have time to keep up with the nuances, evolutions, and developments happening in cybersecurity every day. You’re serving customers, managing device deployments, and looking for the next innovation to push your company ahead in your market! So, how do you ensure that you’ve implemented the right cybersecurity platform for your business?

You look to the experts - independent, third-party analysts who have real-world experience to understand and evaluate cybersecurity options. In this quick guide, we share a brief history of independent cybersecurity testing, showcase some of the best analysts on the market, and help you edit the common misconceptions about these essential technology educators.

READ MORE

RIG Exploit Kit delivers WastedLoader malware

RIG Exploit Kit delivers WastedLoader malware

In February 2021, we identified a new RIG Exploit Kit campaign exploiting VBScript vulnerabilities CVE-2019-0752 and CVE-2018-8174 in unpatched Internet Explorer browsers.


We managed to reproduce several instances in our lab and were curious what malware it delivers. We found out it looks like WastedLocker minus the ransomware functionality, which is probably downloaded from the C&C servers.


Because it works like a loader for the downloaded payload, we will name it WastedLoader.In this article, we analyze RIG EK’s landing page and exploits, and the WastedLoader malware.

READ MORE

Naikon - Traces from a Military Cyber-Espionage Operation

Naikon - Traces from a Military Cyber-Espionage Operation

This report details a Bitdefender Labs investigation that focuses on the abuse of vulnerable legitimate software, which eventually lead to uncovering a long-running operation of a notorious APT group known as NAIKON.

READ MORE

Bitdefender 2020 Consumer Threat Landscape Report

Bitdefender 2020 Consumer Threat Landscape Report

While 2020 was not a typical year for average users or organizations, threat actors and threats thrived and even evolved in light of the global pandemic caused by the COVID-19 virus. The consumer threat landscape report for 2020 is meant as an overview of the evolution of threats year-over-year and on a quarterly basis, in an attempt to highlight trends that will likely spill into 2021.

From how ransomware has evolved both globally and in specific countries, to Android threats, IoT and spam, Bitdefender consumer telemetry aims to capture a snapshot of what threats targeted the average user and how to best protect against them.

READ MORE

FIN8 Returns with Improved BADHATCH Toolkit

FIN8 Returns with Improved BADHATCH Toolkit

In January 2016, a new financially motivated threat actor group made its debut. Dubbed FIN8, this group is known to have used a diverse array of techniques, from spear-phishing to zero-day exploits in Windows, to infect retail, hospitality and entertainment companies and steal payment card data from POS systems.

Our analysis reveals several differences between three deployed BADHATCH versions and to isolate the differences between versions, which helps us pinpoint campaigns on a timeline.

READ MORE

Iranian APT Makes a Comeback with “Thunder and Lightning” Backdoor and Espionage Combo

Iranian APT Makes a Comeback with “Thunder and Lightning” Backdoor and Espionage Combo

Bitdefender researchers recently investigated the decade-old Foudre (French for “lightning”) APT that now uses a new component named “Tonnerre” (French for “thunder”). First investigated in May 2016, the Foudre malware is allegedly of Iranian origin and traditionally targets both government and the private sector.

The investigation started from a sample submitted for analysis to our researchers by the Argos, investigative program HUMAN/VPRO. Once unpacked, the archive contained both a document and a binary, both installing a backdoor into the compromised machine. Since the backdoor is designed to work on x86 and x64 Windows machines, threat actors were likely betting that victims would download and open the archive.

READ MORE

Remcos RAT Revisited: A Colombian Coronavirus-Themed Campaign

Remcos RAT Revisited: A Colombian Coronavirus-Themed Campaign

In the late summer of 2020, the Bitdefender Active Threat Control team noticed a surge of Remcos malware, with most
of the attacks taking place in Colombia. While the malware family has been known for quite a while to cyber-criminals
and malware researchers alike, this new campaign captured our attention as it arrived on the victims’ computers via
phishing e-mails related to financial services and COVID-19 information.

READ MORE

New TA551 Campaign Uses IceID, Complex Attack Chain to Compromise

New TA551 Campaign Uses IceID, Complex Attack Chain to Compromise

In late 2017, the Emotet Trojan started to propagate a new family of malware. Dubbed IceID, this new banker Trojan
employed several mechanisms to target business, including webinjection and redirection attacks. Since its emergence
in 2017, this threat has adopted new tactics, including interjecting into genuine conversations that had been exfiltrated
in previous breaches.

READ MORE

Cracking the Sonoff / eWeLink Platforms: Hijacking Lights and Outlets Around the World

Cracking the Sonoff / eWeLink Platforms: Hijacking Lights and Outlets Around the World

Smart lighting and automation have opened up tremendous opportunities in residential architecture and design. Whether in plain sight or hidden under drywall, these convenient and relatively inexpensive intelligent outlets and switches have made their way into the smart home and stayed there.

At Bitdefender, our researchers are regularly inspecting
IoT devices and platforms to identify vulnerabilities and develop new mitigations in the Bitdefender IoT Security Platform.

This whitepaper outlines several issues in the ITEAD Sonoff / eWeLink, a platform developed by Chinese vendor Coolkit.

READ MORE

Antispam Software Development Kit

Antispam Software Development Kit

The Bitdefender Security for Mail Servers solution, powered by the antispam technology, is the only product to have received 24 consecutive VBSpam+ awards, the highest certification awarded in the VBSpam Tests performed by Virus Bulletin.

READ MORE

Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions

Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions

When monitoring for activity of APT groups in the Asian region, Bitdefender researchers found signs of a complex and targeted espionage attack on potential government sector victims in South East Asia, carried out by a sophisticated Chinese APT group, judging from some of the forensic artifacts left behind.

The operation was conducted over at least a few years, as the earliest signs of potential compromise date back to late 2018. While current forensic evidence follows the attack timeline up to 2020, a large number of C&C servers are inactive. It’s likely the overall attacker-controlled infrastructure used in the attack is currently inactive, even though very few C&Cs have been found to still be operational.

READ MORE

A Decade of WMI Abuse – an Overview of Techniques in Modern Malware

A Decade of WMI Abuse – an Overview of Techniques in Modern Malware

Windows Management Instrumentation (WMI) is the infrastructure for management data and operations on Windows-based operating systems. The earliest mainstream use of WMI in malware was Stuxnet, a cyber-weapon that completely reshaped cybersecurity.

This whitepaper presents a summary of malware that uses WMI to achieve their goal.

READ MORE

Looking Into the Eye of the Interplanetary Storm

Looking Into the Eye of the Interplanetary Storm

Bitdefender researchers have found clues that the Interplanetary Storm Golang botnet could be used as highly anonymous proxy-network-as-a-service and potentially rented using a subscription-based model.

While the botnet has been under previous scrutiny from Bitdefender researchers, constant monitoring of the development lifecycle of Interplanetary Storm has revealed that threat actors are both proficient in using Golang and development best practices, and well-versed at concealment of management nodes.

While previous research from security researchers has focused on analyzing some of the capabilities of the malware and its network traffic, Bitdefender researchers have provided the full picture as well as focused on finding leads regarding the malware developers’ identity and the potential purpose of the infrastructure.

READ MORE

Cracking the LifeShield: Unauthorized Live-Streaming in your Home

Cracking the LifeShield: Unauthorized Live-Streaming in your Home

Do-it-yourself home security solutions are centerpieces of the modern lifestyle. From sensors to surveillance and anything in between, these solutions have our back while we’re at home and, even more importantly, while we’re away.

Gaps in this fragile ecosystem can have unforeseen consequences and might even turn devices that protect our privacy into tools that violate it. While looking into the LifeShield camera, Bitdefender researchers discovered several security issues described in this paper.

READ MORE

Dissecting LemonDuck Crypto-Miner, a KingMiner Successor

Dissecting LemonDuck Crypto-Miner, a KingMiner Successor

Crypto-currencies have enjoyed dramatic adoption in the past few years, with miners attempting to boost mining capabilities while predicting market fluctuations at the same time. This new crypto-gold rush has been capped as of late by mining corrections and increased energy prices.

This whitepaper details on LemonDuck, an advanced piece of malware that compromises enterprise networks for cryptocurrency mining.

READ MORE

Bitdefender 10 IN 10 Study: Seven in Ten CISOs Believe Cyberwarfare is an Imminent Threat to Their Organisations

Bitdefender 10 IN 10 Study: Seven in Ten CISOs Believe Cyberwarfare is an Imminent Threat to Their Organisations

The constant state of change and rapidly evolving cybersecurity landscape, has led us to conduct the 10 in 10 Study — a comprehensive piece of independent research — looking at what factors will most impact security success in the next decade.

The research has explored the specific expectations organisations have when it comes to security, and with the help of third parties, examined what security teams would want to do if they had more time, more money and company cultures that embraced and supported cybersecurity.

READ MORE

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting an international architectural and video production company, pointing to an advanced threat actor and a South Korean based C&C infrastructure.

Industrial espionage is nothing new and, since the real-estate industry is highly competitive, with contracts valued at billions of dollars, the stakes are high for winning contracts for luxury projects and could justify turning to mercenary APT groups for gaining a negotiation advantage.

READ MORE

Bitdefender Mid-Year Threat Landscape Report 2020

Bitdefender Mid-Year Threat Landscape Report 2020

The threat landscape has always been influenced by events and shifts in cybercriminal practices, but the global coronavirus pandemic has caused a significant shift both in how cybercriminals operate and how they hone their skills.

A defining characteristic of the first half of 2020 in terms of threats and malware is that they all played on the same theme: the pandemic. A spike in scams, phishing and malware across all platforms and attack vectors seems to have been a direct result of cybercriminals leveraging issues related toCovid-19 to exploit fear and misinformation.

READ MORE

Cracking the August SmartLock: WiFi Password Eavesdropping Made Easy

Cracking the August SmartLock: WiFi Password Eavesdropping Made Easy

The rise of online property rental in an increasingly competitive sharing economy has had a significant impact on the adoption of Internet-connected smart locks. Packed with features that allow landlords to issue and revoke access by electronically sharing a token or PIN code during booking, smart locks have managed to eliminate the need to meet strangers or use key drops.

Unlike most IoT devices, smart locks create physical security boundaries, and products from top lock companies are preferred to generic brands. But do the devices made by lock companies that made history in the evolution of the modern lock live up to their digital promise?

READ MORE

Kingminer – a Crypto-Jacking Botnet Under the Scope

Kingminer – a Crypto-Jacking Botnet Under the Scope

n late 2017, crypto currencies in general (and Bitcoin in particular) have appreciated tremendously. As some digital currencies spiked to $20,000 in fiat money, a new kind of gold rush started. By compromising computers with coin miners, cyber-criminals could take in great profits at zero hardware costs.

This white-paper tells the story of Kingminer, a botnet that has undergone significant changes to stay relevant and avoid detection.

READ MORE

StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure

StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure

StrongPity, also known as Promethium, is a threat group that is assumed to have been active since at least 2012. Information about this actor was first publicly reported in October 2016 with details on attacks against users in Belgium and Italy. Later, in 2018, the attackers shifted their focus on another geographical region, compromising Turkish telecommunication companies to target hundreds of users in Turkey and Syria.

It is believed that the attacks attributed to StrongPity are government-sponsored and are used for population surveillance and intelligence exfiltration. More so, it is believed that these attacks are used as support for the geo-political conflicts in the region. The known preferred infection vector used by the StrongPity group is a watering hole technique, delivering malicious versions of legitimate installers to
certain targets.

READ MORE

BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool

BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool

In 2016, a sophisticated malware campaign targeting Pakistani nationals made headlines. Dubbed Bitter, the Advanced Persistent Threat group (also known as APT-C-08) has been active both in desktop and mobile malware campaigns for quite a long time, as their activity seems to date back to 2014.

This paper is a technical account of the developments related to Bitter, its evolution and how, steadily and surely, threat actors are upping their game and poking holes in Google Play to use it as a propagation vector.

READ MORE

Bitdefender 10 IN 10 Study: The Indelible Impact of COVID-19 on Cybersecurity

Bitdefender 10 IN 10 Study: The Indelible Impact of COVID-19 on Cybersecurity

The Indelible Impact of COVID-19 on Cybersecurity Study was conducted among 6,724 Security and IT workers in May 2020 across the UK, US, Australia/New Zealand, Germany, France, Italy, Spain, Denmark and Sweden.

Representing a broad cross-section of organisations and industries, from fledgeling SMEs, through to publicly listed 10,000+ person enterprises. The report, which will form part of the yet to be released 10 in 10 Study, details the pressures faced by IT professionals during the COVID-19, how these pressures are testing the effectiveness of security measures and the changes they will need to make within their organisations as a result.

READ MORE

Loading DLLs for illicit profit. A story about a Metamorfo distribution campaign

Loading DLLs for illicit profit. A story about a Metamorfo distribution campaign

Late last year, we noticed a massive ongoing campaign of banker malware concentrated primarily in Brazil. The threat
actors behind this campaign have a predilection for defense evasion, with their signature modus operandi revolving around a technique named dynamic-link library (DLL) hijacking.

During the time we monitored the Metamorfo campaign, we’ve seen 5 different software components, manufactured
by respected software vendors, abused in the attack. This whitepaper covers the technical details of the attack and how operators abuse legitimate tools to evade detection.

READ MORE

Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia

Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia

Chafer APT is a threat group with an apparent Iranian link. It is known to be active since 2014, focusing on cyber espionage campaigns. Bitdefender has spotted the group targeting critical infrastructure from the Middle East, presumably for intelligence gathering.

Bitdefender researchers have found attacks conducted by this actor in the Middle East region, dating back to 2018. The campaigns were based on several tools, including “living off the land” tools, which makes attribution difficult, as well as different hacking tools and a custom built backdoor.

READ MORE

Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years

Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years

In early 2020 we identified a new, highly sophisticated Android espionage platform that had been active in the wild for at least 4 years. We named the threat Mandrake as the actor(s) behind it used names of toxic plants, or other botanical references, for major development branches: e.g. Briar, Ricinus or Nerium.

This whitepaper provides insight into how the malware operates, what its end goal was and how it successfully managed to stay undetected in an official app store for more than 4 years.

READ MORE

Coronavirus Report: Popular Android Apps Impersonated by Malware

Coronavirus Report: Popular Android Apps Impersonated by Malware

The serious isolation measures adopted to stop the Coronavirus pandemic has forced people to turn to technology as a bridge to the rest of the world.

Whether it’s for working from home, online school courses or entertainment, people rely more than ever on smart devices to ease the effects of social distancing, and malware developers have been quick to adapt to the new reality.

Here at Bitdefender we keep a close eye on cyber-criminals’ techniques, and we develop mitigations for a safer experience at home, at the office or at school. For the past three months, we have monitored trending mobile applications and have looked for cloned applications rigged with malware.

READ MORE

New dark_nexus IoT Botnet Puts Others to Shame

New dark_nexus IoT Botnet Puts Others to Shame

Bitdefender researchers have recently found a new IoT botnet packing new features and capabilities that put to shame most IoT botnets and malware that we’ve seen.





We named the botnet "dark_nexus" based on a string it prints in its banner and we have documented its behavior in this whitepaper.

READ MORE

A Technical Look into Maze Ransomware

A Technical Look into Maze Ransomware

At the end of May 2019, a new family of ransomware called Maze emerged into the gaping void left by the demise of the GandCrab ransomware. Bitdefender experts take a deep dive into Maze Ransomware to expose the shady techniques it uses to perform obfuscation, evasion, exploitation and ultimately, encryption.

READ MORE

New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong

New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong

Bitdefender researchers have discovered a new TrickBot module (rdpScanDll) built for RDP bruteforcing operations on select targets. The new module was discovered on January 30 and, based on the IP addresses it targets, victims seem to be US and Hong Kong-based, predominantly in the telecom industry.

While TrickBot is a Trojan that has been around since 2016, it started out as a credential-harvesting threat mostly focusing on e-banking, while its plugin-based design has made it much more than just a threat focused on financial data theft. S

READ MORE

Severe Vulnerability in iBaby Monitor M6S Camera Leads to Remote Access to Video Storage Bucket

Severe Vulnerability in iBaby Monitor M6S Camera Leads to Remote Access to Video Storage Bucket

Baby monitors have become increasingly common in modern homes. To many parents, the ability to keep an eye on children while away is worth the risk of having video feeds or pictures leaked to unauthorized parties.

This whitepaper – part of a series developed in partnership with PCMag – aims to shed light on the security of the world’s bestsellers in the IoT space. PCMag contacted the research team at Bitdefender and asked us to look at several popular internetconnected devices, including the iBaby Monitor M6S camera.

READ MORE

Bitdefender Cyber Threat Hunting Guide

Bitdefender Cyber Threat Hunting Guide

Like ‘AI’, ‘machine learning’, or ‘actionable intelligence’, ‘Cyber Threat Hunting’ has become an industry buzzword that is used in multiple contexts and now has no clear definition. But understanding how to hunt across an environment requires that we must first understand exactly what Cyber Threat Hunting is

READ MORE

MDR Reduces Threat Detection and Response Challenges

MDR Reduces Threat Detection and Response Challenges

Organization struggle with threat detection and response (TDR) because of high volume of s and the increasing sophistication of attacks. Savvy CISOs turn to managed detection and response (MDR) services to utilize providers’ technical acumen, machine-based detection, and threat curation, and to respond faster. The best solutions will feature services that have high fidelity threat intelligence and take preapproved proactive response actions on behalf of the customer.

READ MORE

Help Found: Cyber Skills Through Managed Detection and Response Services

Help Found: Cyber Skills Through Managed Detection and Response Services

With the cybersecurity skills shortage continuing unabated year after year, organizations turn to managed detection and response (MDR) services for help. Specialized human acumen and tailored threat data in MDR offerings help reduce the security volume faced by security analysts. The best solutions will feature threat data that is curated by a service provider with a long history in threat detection and align that data with customers’ industry and market segment requirements in order to take proactive response actions to thwart the adversary.

READ MORE

RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

RDP Abuse and Swiss Army Knife Tool Used to Pillage, Encrypt and Manipulate Data

Bitdefender researchers recently found threat actors abusing a legitimate feature in the RDP service to act as a fileless attack technique, dropping a multi-purpose off-the-shelf tool for device fingerprinting and for planting malware payloads ranging from ransomware and cryptocurrency miners to information and clipboard stealers.

The campaigns do not seem to target specific industries or companies; instead, threat actors have used a shotgun approach, focusing on reaching as many victims as possible. In terms of financial impact, estimated cryptocurrency earnings based on the cryptocurrency wallets found indicate attackers have netted at least $150,000 through some of their campaigns.

READ MORE

Multiple Vulnerabilities in Belkin WeMo Insight Switch

Multiple Vulnerabilities in Belkin WeMo Insight Switch

Internet of Things devices have become commonplace in modern homes. Relatively inexpensive and easy to control remotely, they promise a world at your fingertips. Security vulnerabilities in connected devices can not only affect the user experience but can also give cyber-criminals an open door to your local network. This is also the case with the Belkin WeMo Insight Switch, a smart power plug that lets you turn any conventional device into a smart one.

READ MORE

Threat Intelligence Required for Effective Managed Detection and Response

Threat Intelligence Required for Effective Managed Detection and Response

Cybersecurity professionals are responsible for threat prevention, detection, and response and most invest abundant resources, both human and budgetary, into security controls and processes in this area.

Threat prevention starts with good security tools hygiene and must-have controls like endpoint security software, intrusion prevention, and the like. However, despite all the controls in place, adversaries still break through threat defenses and compromise the environment. The rise to prominence of detection and response over mere protection capabilities is a direct result of security tool vulnerability to the continued rise in adversarial sophistication.

READ MORE

IoT Security: a close look at the Ring Doorbell Pro

IoT Security: a close look at the Ring Doorbell Pro

As the creator of the world’s first smart-home cybersecurity hub, Bitdefender constantly audits popular pieces of IoT hardware for
vulnerabilities that might affect customers if left unaddressed. This report documents a flaw in the Ring Doorbell Pro that allows an attacker physically near the device to intercept the owner’s Wi-Fi network credentials and possibly mount a larger attack against the household network.

READ MORE

Bitdefender Mid-Year Threat Landscape Report 2019

Bitdefender Mid-Year Threat Landscape Report 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs.

With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

READ MORE

Dozens of Apps Still Dodging Google’s Vetting System, Dropping Aggressive Adware in Play Store

Dozens of Apps Still Dodging Google’s Vetting System, Dropping Aggressive Adware in Play Store

Bitdefender researchers recently analyzed 25 apps that made it into Google Play, at least for a time, packing aggressive adware SDKs that bombarded users with ads and avoided removal by hiding their presence. Cumulatively, the apps were apparently downloaded almost 700,000 times by Google Play users.

While Google has gone to great lengths to ban malicious or potentially unwanted applications from the official Android app store, malware developers are nothing if not imaginative when coming up with new ideas to dodge Google Play Protect.

READ MORE

Increasing Cybersecurity Resilience through Security Automation

Increasing Cybersecurity Resilience through Security Automation

The ever-evolving threat landscape, coupled with the increased number of cyberattacks aimed at businesses and organizations, has accelerated adoption of a growing number of security solutions. The malware-as-a-service industry has lowered the bar for cybercriminals -- not having the right technical skills is no longer a barrier for those who want an exploit kit, ransomware kit, or even a botnet.

Cyber risk is now among the top 5 risks affecting businesses, according to 65 percent of executives. At the same time, the risk of cyberattacks ranks the third most likely occurrence, right after natural disasters, according to the World Economic Forum’s Global Risk Report for 2018. Cybercrime as an industry has also grown from $450 billion in 2016 and is estimated to reach a whopping $2 trillion by 2019, according to the same report.

READ MORE

A close look at Fallout Exploit Kit and Raccoon Stealer

A close look at Fallout Exploit Kit and Raccoon Stealer

Over the last few months, we have seen increased Exploit Kit activity. One example is the Fallout Exploit Kit, which we will describe in depth in this article.

Since its emergence in August 2018, threat actors have intensively used the Fallout Exploit Kit to deliver ransomware (GandCrab, Kraken, Maze, Minotaur, Matrix and Stop), Banker Trojans (DanaBot) and information stealers (RaccoonStealer, AZORult, Vidar), and others.

READ MORE

Who IsErIk: A Resurface of an Advanced Persistent Adware?

Who IsErIk: A Resurface of an Advanced Persistent Adware?

As the malware industry expands, new tricks added to the cyber-criminal arsenal show up on a daily basis. Our Advanced Threat Control team has identified a massive expansion of the malicious repertoire meant to resurface old, but not-forgotten threats. The main focus of this analysis is an adware loader, first discovered in 2016, which has kept such a low profile that researchers still haven’t agreed to a common denomination, generically identifying it as APA – Advanced Persistent Adware.

READ MORE

Worm-Cryptominer Combo Lets You Game While Using NSA Exploits to Move Laterally

Worm-Cryptominer Combo Lets You Game While Using NSA Exploits to Move Laterally

Bitdefender researchers recently found and analyzed a worm-cryptominer combo that uses a series of exploits to move laterally and compromise victims. What makes it interest is that it pauses the resource-intensive cryptomining process if it finds popular games running on the victim’s machine.

The investigation revealed that the worm-cryptominer has been constantly updated by its developers. Some of its modules were updated to make it difficult for security researchers to analyze it, as well as improve lateral movement and other capabilities.

READ MORE

Astaroth Trojan Resurfaces, Targets Brazil through Fileless Campaign

Astaroth Trojan Resurfaces, Targets Brazil through Fileless Campaign

During routine detection monitoring from our Advanced Threat Control technology, Bitdefender researchers found an interesting spike in malware activity that involved using Microsoft binaries in the infection process, as well as GitHub and Google Drive for delivering payloads.

After analyzing the detection details, we identified this activity as a resurgence of the Astaroth spyware, a Trojan and information stealer known since late 2017.

READ MORE

Scranos Revisited – Rethinking persistence to keep established network alive

Scranos Revisited – Rethinking persistence to keep established network alive

In April, Bitdefender broke the news of an emerging botnet dubbed Scranos. Originating from China, it has spread across Europe and the United States, snaring Windows and Android devices with advertising fraud and social network manipulation.

We kept an eye on the developments in the weeks after the publication and documented how the operators tried to rebuild the botnet and restore functionality. This led us to identify new components used to generate ad revenue in the background by visiting arbitrary URLs with Google Chrome and to disguise these ads as notifications, generating additional ad revenue at the user’s expense.

READ MORE

An APT Blueprint: Gaining New Visibility into Financial Threats

An APT Blueprint: Gaining New Visibility into Financial Threats

In mid-2018, Bitdefender researchers investigated a targeted attack on an Eastern European financial institution, gaining new insights and creating a complete event timeline showing how the infamous group Carbanak infiltrates organizations, how it moves laterally across the infrastructure, and the time it takes to set up the actual heist.

The initial point of compromise found in our investigation involved the use of spear-phishing emails with malicious URLs and tainted documents rigged to download a Cobalt Strike beacon component. Within hours of compromise, the cybercriminal group would begin to move laterally across the infrastructure, identify critical documents and prepare them for exfiltration, and try to access the organization’s ATM and banking applications.

READ MORE

The Challenges of Digital Parenting in the Connected Home

The Challenges of Digital Parenting in the Connected Home

What are the challenges of digital parenting and how can parents live in harmony with their digital-native kids? As families grow more connected and daily life moves online, privacy and security should become top priorities in each smart home.

READ MORE

Boosting SOC Efficiency with Contextual and Real-Time Insights into the Global Threat Landscape

Boosting SOC Efficiency with Contextual and Real-Time Insights into the Global Threat Landscape

The cybercrime industry has evolved over the past couple of years, and is becoming increasingly sophisticated and lucrative. It generated over $1.5 trillion in illicit profit during 2017 and 2018, and is predicted to inflict over $6 trillion dollars in damages by 2021. Destructive malware attacks have become one of the most prevalent and expensive
consequences of advanced cybercrime. While the number of reported data breaches fell slightly in 2018 from 2017, the number of exposed records is estimated at 5 billion.

READ MORE

Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation

Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation

Last year, the Bitdefender Cyber Threat Intelligence Lab started analysis of a new password- and data-stealing operation based around a rootkit driver digitally signed with a possibly stolen certificate. The operation, partially described in a recent article by Tencent, primarily targeted Chinese territory until recently, when it broke out around the world.

READ MORE

The Evolution of Ransomware in 2018

The Evolution of Ransomware in 2018

In just the past few years, ransomware has evolved from a novelty to the most feared malware of the digital era. Amateur hackers have amassed fortunes thanks to this prolific crypto-viral extortion scheme, but things are beginning to change. Advanced criminals with increasingly sophisticated attack avenues and obfuscation techniques are putting the original small crooks to shame.

Today’s bad guys not only manage to evade corporate defenses, they are also insatiable in their ransom demands. Ransomware drains billions from the global economy each year and shows no signs of slowing down. However, the highest cost of a ransomware attack is no longer the ransom itself.

READ MORE

Combating Advanced Threats with Network Analytics

Combating Advanced Threats with Network Analytics

In an increasingly complex environment (IoT, BYOD, etc.) and a digital economy riddled with cyber incidents and threats, organizations clearly need a more proactive solution.
A solution with visibility into network-level threats and traffic anomalies, and the ability to detect risky user behavior that can lead to breaches and data leaks.

They want automated security analytics to reduce noise and improve threat-hunting efficiency. And they need quick, actionable insights to speed up incident response.

Network traffic analytics represents the next generation of threat detection. It is a solution tailored for combating advanced threats in a security analytics market that Research and Markets predicts will reach $6.5 billion in 2022.
Bitdefender Network Traffic Security Analytics (NTSA) is the Bitdefender NTA solution offering real0-time breach detection and complete threat visibility to help CISOs employ a more comprehensive and effective approach.

READ MORE

Ransomware – A Growing Menace for Healthcare Providers

Ransomware – A Growing Menace for Healthcare Providers

Costs associated with data breaches in healthcare are nearly three times higher than in other industries. Health or clinical data is also the most common type of personal data compromised. Electronic health records contain highly sensitive data, yet many clinics communicate through unsecure channels and their systems are poorly patched. Stolen patient health information that makes its way onto the dark can be used for various kinds of fraud and extortion, such as banking and credit fraud, healthcare fraud, identity theft and ransom extortion.

READ MORE

Linux in the Datacenter: Why Baseline Security is Not Enough

Linux in the Datacenter: Why Baseline Security is Not Enough

The Linux kernel has been characterized as the most exposed operating system in the world, surpassing even Mac OS X. Beyond kernel, a wide range of vulnerabilities can affect a Linux machine’s application stack, be it proprietary or open source.

Given the prevalence of Linux in the datacenter, such vulnerabilities can cause widespread damage to businesses. Read this Bitdefender whitepaper to learn about notorious Linux attacks from Heartbleed to Erebus ransomware and ways to protect your environment against them.

READ MORE

Top Security Challenges for the Financial Services Industry in 2018

Top Security Challenges for the Financial Services Industry in 2018

How Well Is the Financial Services Industry Doing on Security? Healthcare, manufacturing and financial services have one thing in common: they are the three most-targeted industries in 2018. Not only do they provide access to reams of data, but the sectors are also critical to society. So, if hackers want to seriously do harm, they can go after either of these sectors to succeed. Companies in the financial services sector manage money, covering banking, offshore financial operations, stock brokers, credit card vendors, insurance companies and investment funds.
What is the actual cost of breaches in this sector and what kind of measures do CISOs leading financial services institutions take to ensure proper cyber defense, data security and prevent business disruption? The financial services sector currently spends as much as 40 percent more on breach containment and detection than it did three years ago, Accenture found, making it easily “the highest cost of cybercrime” in comparison with other industries. Financial services companies are severely impacted by business disruption and information loss, which end up draining the mitigation budget.

READ MORE

Bitdefender Global Mid-Year Threat Landscape Report 2018

Bitdefender Global Mid-Year Threat Landscape Report 2018

The first half of 2018 brought interesting developments in terms of new emerging threats, significant “upgrades” to old threats, and a change in cybercriminal tactics when choosing targets and tools to increase revenue.

From an increase in the number of reported vulnerabilities to ransomware, cryptocurrency miners, fileless malware, and Android threats, we've also seen adware that is now borderline malware and IoT malware that both persistent and resilient.

READ MORE

Triout - The Malware Framework for Android That Packs Potent Spyware Capabilities

Triout - The Malware Framework for Android That Packs Potent Spyware Capabilities

Bitdefender researchers have identified a new Android spyware that seems to act as a framework for building extensive surveillance capabilities into seemingly benign applications. Found bundled with a repackaged app, the spyware’s surveillance capabilities involve hiding its presence on the device, recording phone calls, logging incoming text messages, recoding videos, taking pictures, collecting GPS coordinates, and broadcasting all of that to an attacker-controlled C&C server.

READ MORE

Cyber Risk Management

Cyber Risk Management

Many experts say that data, and not gold or oil, has become the most valuable commodity in the world in recent years. As the value of data increases, cyber-attacks become a threat that business leaders have no choice but to place at the top of their priority list. But how can organizations manage cyber risks and improve readiness for regulations like GDPR?

This whitepaper uncovers software vulnerabilities as a major risk exposure for organizations. It also shows how frameworks like NIST and patch management solutions can be of great help in eliminating vulnerabilities and manage cyber risk exposure.

READ MORE

Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

The line between adware and spyware has become increasingly fuzzy during recent years as modern adware combines aggressive opt-outs with confusing legal and marketing terms as well as extremely sophisticated persistence mechanisms aimed at taking control away from the user.

This whitepaper details an extremely sophisticated piece of spyware that has been running covertly since early 2012, generating revenue for its operators and compromising the privacy of its victims.

READ MORE

RadRAT: An all-in-one toolkit for complex espionage ops

RadRAT: An all-in-one toolkit for complex espionage ops

Around February this year, we came across a piece of malware that had previously gone unnoticed. Buried in the malware zoo, the threat seems to have been operational since at least 2015, undocumented by the research community.
 
Our interest was stirred by its remote access capabilities, which include unfettered control of the compromised computer, lateral movement across the organization and rootkit-like detection-evasion mechanisms. Powered by a vast array of features, this RAT was used in targeted attacks aimed at exfiltrating information or monitoring victims in large networked organizations.

This whitepaper details on the technical capabilities of RadRAT, its complex lateral movement mechanisms and other particularities that make it an advanced threat.

READ MORE

CISOs’ Toughest Dilemma: Prevention Is Faulty, yet Investigation Is a Burden

CISOs’ Toughest Dilemma: Prevention Is Faulty, yet Investigation Is a Burden

A Bitdefender survey on IT security purchase professionals from large companies in the US and Europe

(April 2018)

READ MORE

Endpoint Detection & Response (EDR) - How to safeguard customers’ personally identifiable information under the GDPR

Endpoint Detection & Response (EDR) - How to safeguard customers’ personally identifiable information under the GDPR

More data records were lost or stolen in the fi rst half of 2017 than in all of 2016. And in 2017, Gartner found organizations were gravely underprepared for the European Union’s General Data Protection Regulation (GDPR). More than half of companies affected by the regulation will not be in full compliance when it takes effect in May, the group said.

With only two months to go before the regulation is enforced, studies show little has changed. Yet the pressure of complying with the upcoming law weighs more heavily on everyone’s shoulders by the day. Fortunately, solutions are readily available to businesses big and small seeking to ensure cyber resilience on their way to GDPR compliance.

READ MORE

Cryptocurrency Mining Craze Going for Data Centers

Cryptocurrency Mining Craze Going for Data Centers

Cybercriminals have always been financially motivated, and cryptocurrency mining is the latest trend in generating revenue by abusing the same age-old malware attack vectors previously associated with ransomware dissemination. The recent Bitcoin craze, with the currency peaking at $19,000 per unit, has focused cybercriminals on crypto mining, instead of traditional ransomware.

Bitdefender telemetry has shown that crypto currency-enabled malware is increasingly outdoing ransomware in popularity, with the rise in adoption picking up in the past six months.

READ MORE

Hybrid Architectures and Software-Defined Datacenters Drive New Requirements for Security Solutions

Hybrid Architectures and Software-Defined Datacenters Drive New Requirements for Security Solutions

The evolution of IT architecture, with the software-defined and cloud technologies at its heart, is fundamental to business transformation. It allows organizations to capitalize on scalable, flexible infrastructure and rapidly roll out new applications, products, and services. At the same time, datacenter modernization introduces security challenges that many solutions struggle to address.


Read this IDC whitepaper, sponsored by Bitdefender, to learn about transformative datacenter technologies (including software-defined compute, storage, networking, hyperconverged infrastructure, and hybrid cloud), the security challenges they entail and new requirements for security solutions they impose.

READ MORE

Playing Hide ‘N Seek: World’s first IoT Botnet with custom-built P2P communication

Playing Hide ‘N Seek: World’s first IoT Botnet with custom-built P2P communication

Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure. The bot, dubbed HNS, was intercepted by our IoT honeypot system following a credentials dictionary attack on the Telnet service.


The bot was first spotted on Jan. 10 then faded away in the following days, only to re-emerge on Jan. 20 in a significantly improved form.

READ MORE

Operation PZCHAO - Inside a highly specialized espionage infrastructure

Operation PZCHAO - Inside a highly specialized espionage infrastructure

This whitepaper tells the story of a custom-built piece of malware that we have been monitoring for several months as it wrought havoc in Asia.

Our threat intelligence systems picked up the first indicators of compromise in July last year, and we have kept an eye on the threat ever since.

This whitepaper takes an in-depth look at the the attack chain, the infrastructure used by the threat actors, the malware subdomains they control and the payloads delivered on the targeted systems, as well as other telltale signs about a possible return of the Iron Tiger APT.

READ MORE

Terdot: Zeus-based malware strikes back with a blast from the past

Terdot: Zeus-based malware strikes back with a blast from the past

This whitepaper is a technical analysis of the Terdot, a Banker Trojan that derives inspiration from the 2011 Zeus source code leak. Highly customized and sophisticated, Terdot can operate a MITM proxy, steal browsing information such as login credentials and stored credit card information, as well as inject HTML code in visited Web pages.

READ MORE

Virtualization’s hidden traps: security has become a battlefield for CISOs

Virtualization’s hidden traps: security has become a battlefield for CISOs

• 85% of CISOs fear security flaws in the public cloud
• Half of CISOs say virtualization increases their company’s attack surface
• Only one company in six encrypts all data

READ MORE

EHDevel – The story of a continuously improving advanced threat creation toolkit

EHDevel – The story of a continuously improving advanced threat creation toolkit

More than a year ago, on July 26th 2016, the Bitdefender Threat Intelligence Team came across a suspicious document called News.doc.

Upon preliminary investigation, the sample revealed a set of similar files that bear the same features, but appear to have been used in separate attacks targeted at different institutions.

This plug-and-play malware framework uses a handful of novel techniques for command and control identification and communications, as well as a plugin-based architecture, a design choice increasingly being adopted among threat actor groups in the past few years.

Dubbed EHDevel, this operation continues to this date, the latest known victims reportedly being several Pakistani individuals. In their case, the threat actors have chosen different lures than the ones presented in this paper, but the modus operandi is identical.

READ MORE

New Pacifier APT Components Point to Russian-Linked Turla Group

New Pacifier APT Components Point to Russian-Linked Turla Group

In 2016, Bitdefender uncovered a new advanced persistent threat dubbed Pacifier, targeting government institutions starting in 2014. Using malicious .doc documents and .zip files distributed via spear phishing e-mails, attackers would lure victims with invitations to social functions or conferences into executing the attachments. Our previous analysis of the Pacifier components revealed that it’s capable of dropping multi-stage backdoors and that the analyzed first stage dropper is also known as “Skipper” by other security vendors.

Our new whitepaper covers an in-depth analysis of the three new backdoor modules, as well a short description of their capabilities and features.

READ MORE

Remote Exploitation of the NeoCoolcam IP Cameras and Gateway

Remote Exploitation of the NeoCoolcam IP Cameras and Gateway

The Internet of connected things has changed the way we interact with our homes, offices or even with our own bodies. But although connected devices are sold mostly everywhere, manufacturers haven’t dived deep into the technology, as more innovation is expected to emerge the more connected we are.

In 2016, security researchers from Bitdefender detected multiple vulnerabilities in a number of Internet of Things devices. This paper is another investigative effort in the IoT space and it details the compromise of a vendor’s line of IPTV and gateway products by trivial remote exploitation.

READ MORE

Inexsmar: An unusual DarkHotel campaign

Inexsmar: An unusual DarkHotel campaign

The DarkHotel threat actors have been known to operate for a decade now, targeting thousands of businesses across the world via Wi-Fi infrastructure in hotels.

This whitepaper covers a sample of a particular DarkHotel attack, known as Inexsmar. Unlike any other known DarkHotel campaigns, the isolated sample uses a new payload delivery mechanism rather than the consacrated zero-day exploitation techniques. Instead, the new campaign blends social engineering with a relatively complex Trojan to infect its selected pool of victims.

READ MORE

Companies blame competition for corporate cyberespionage

Companies blame competition for corporate cyberespionage

A survey of US, UK, French, German, Italian, Swedish and Danish IT execs (Author: Razvan Muresan)

READ MORE

Everything we know about GoldenEye

Everything we know about GoldenEye

On January 27th, reports of a rapidly spreading ransomware attack started to emerge from Ukraine. The speed at which critical infrastructure networks were shutting down pointed to a ransomware application with a wormable component, whose virality called to mind the WannaCry ransomware. In less than three hours, the infection crippled banks, ATMs, public transport and an airport, as well as utilities provider Kyivenergo. Then it spread outside the Ukraine.

As multiple critical infrastructure networks reported major blackouts, Bitdefender started an internal investigation over the isolated malware samples to trace the attack’s origin and better understand what it targeted, and how. The following report is based on our internal telemetry and reflects what we know as of the moment of writing.

READ MORE

Everything you need to know about the WannaCry ransomware

Everything you need to know about the WannaCry ransomware

For the past decade or so, increasing tensions between International governments have led to what IT security experts call today “cyberterrorism” – the use of cyberweapons (hacks) to spy on or to commission cyber-attacks overseas.

The most recent such example occurred on May 12, 2017 when an unknown group of hackers deployed what was to become the most dangerous ransomware attack ever recorded. WannaCry, as the malware is dubbed, leverages a (now patched) 0-Day vulnerability developed by hackers contracted by the NSA. This whitepaper is a technical detail into how the malware operates and its spreading techniques.

READ MORE

Ransomware targets SMBs due to weaker protection and greater willingness to pay up

Ransomware targets SMBs due to weaker protection and greater willingness to pay up

Attackers are now targeting small and medium businesses to extort higher fees, a Bitdefender survey shows, meeting the company’s predictions for 2017. (Author: Razvan Muresan)

READ MORE

Inside Netrepser – a JavaScript-based Targeted Attack

Inside Netrepser – a JavaScript-based Targeted Attack

In May 2016, the Bitdefender threat response team isolated a number of samples from the internal malware zoo while looking into a custom file-packing algorithm. A deeper look into the global telemetry revealed that this piece of malware was strictly affecting a limited pool of hosts belonging to a number of IP addresses marked as sensitive targets.

Its unusual build could have easily make it pass like a regular threat that organizations block on a daily basis ; however, telemetry information provided by our event correlation service has pointed out that most of its victims are government agencies.

READ MORE

Delivering strong security in a hyperconverged data center environment

Delivering strong security in a hyperconverged data center environment

A new trend is emerging in data center technology that could dramatically change the way enterprises manage and maintain their IT infrastructures. It’s called hyperconvergence, and it’s gaining momentum as companies look for ways to run more efficient and agile technology environments.

READ MORE

Dissecting the APT28 Mac OS X Payload

Dissecting the APT28 Mac OS X Payload

Since the APT28 group’s emergence in 2007, Bitdefender has become familiar with the backdoors used to compromise Windows and Linux targets, such as Coreshell, Jhuhugit and Azzy for the former OS or Fysbis for the latter.

This year we have been able to finally isolate the Mac OS X counterpart - the XAgent modular backdoor. This whitepaper describes our journey in dissecting the backdoor and documenting it piece by piece.

READ MORE

Virtualization makes CIOs role key

Virtualization makes CIOs role key

An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs, shows they will rise in companies’ hierarchies, as CEOs and board members face increasing internal and external security risks that could ruin customer trust and business forecasts. Still, not all C-suites include CIOs/CISOs in the business decision-making process. This survey, carried out by iSense Solutions, shows how IT decision makers perceive their role inside the organizations and what they need to meet shareholder expectations. How has virtualization changed the security game? How many attacks can be stopped with the current resources? Would they pay to avoid public shaming?

READ MORE

Security Awareness in the Age of Internet of Things (A 2016 Bitdefender Study)

Security Awareness in the Age of Internet of Things (A 2016 Bitdefender Study)

This paper looks to shed light on home users’ perception of smart technologies, to showcase how consumer IoT is embraced and understood by Internet users around the United States and Europe. Without a doubt, people are excited by the novelty of connected objects, but how well do they manage security and privacy? Are they succeeding or failing as the administrator of Things in their homes?

READ MORE

Encrypting Businesses – ransomware developers’ favorite cash cow

Encrypting Businesses – ransomware developers’ favorite cash cow

Ransomware, the most prolific cyber threat of the moment, gains foothold in organizations and companies via file-sharing networks, e-mail attachments, malicious links or compromised websites that allow direct downloads. The first quarter of 2016 saw 3,500% growth in the number of ransomware domains created, setting a new record.

READ MORE

From ideas to patents. How visionary security dreams become breakthrough technologies

From ideas to patents. How visionary security dreams become breakthrough technologies

The R&D team is at the center of Bitdefender to ensure we are fully equipped to look after our customers’ interests, both now and in the future. Our team of engineers and researchers reached the 600+ milestone this year. To keep the innovation flame burning bright, Bitdefender invests 25% of its yearly research and development budget in visionary security dreams. From a total of 72 patents, Bitdefender has 42 patents issued for core technologies in past three years alone. In addition, 35 more are currently filed for examination. With almost 10 percent of Bitdefender patents pertaining to machine-learning algorithms for detecting malware and other online threats, deep learning and anomaly-based detection techniques play a vital role in proactively fighting new and unknown threats.

READ MORE

Virtualization brings new security challenges for large companies

Virtualization brings new security challenges for large companies

An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs shows that virtualization is a strategic priority, yet they are still not fully ready for the security challenges this environment brings. Hybrid infrastructures have become the major common architecture in the enterprise environment and CIOs have to adapt to the new world.

This survey, carried out by iSense Solutions, shows the main security concerns and issues they face. What cyber threats are companies not ready to handle?

What are the main concerns regarding the security management of hybrid infrastructures? Why do IT decision makers fear for their jobs?

READ MORE

Delivering Security and Performance in the Continuous Data Center

Delivering Security and Performance in the Continuous Data Center

Enterprises are rapidly transforming how applications, services, and data are delivered and have brought tremendous transformation to enterprise cybersecurity. The changes brought by virtualization, public and private clouds, and the adoption of enterprise management practices such as DevOps are nothing short of astounding.

Unfortunately, when it comes to being both swift and nimble, cybersecurity efforts sometimes can get in the way—at least if they aren’t done right. To successfully secure the continuous data center, security must be continuous, manageable, and unobtrusive.

READ MORE

Pacifier APT

Pacifier APT

Bitdefender detected and blocked an ongoing cyber-espionage campaign against Romanian institutions and
other foreign targets.

READ MORE

Hypervisor Introspection - A Revolutionary Approach to Targeted Attacks

Hypervisor Introspection - A Revolutionary Approach to Targeted Attacks

Recent headlines about data breaches are clear – securing infrastructures against increasingly targeted attacks is imperative, yet traditional endpoint security tools are not closing the gap with attack technologies, let alone getting ahead of them.

A study conducted in February 2016 shows it takes companies an average of 5 months to detect a data breach. What’s more, 53% of them needed external investigators to discover them, as internal resources showed no signs of a breach.

READ MORE

The Impact of Virtualization Security on Your VDI Environment

The Impact of Virtualization Security on Your VDI Environment

VDI empowers employees and employers with many benefits, no matter the size of the organization. However, as with any environment, security should always play a pivotal role and should complement the business environment. With VDI it’s no different; security should be seamless, without any effect on the user experience.

READ MORE

Evolve or Die: Security Adaptation in a Virtual World

Evolve or Die: Security Adaptation in a Virtual World

As virtualization projects continue to accelerate, organizations are discovering they have changed how datacenters are architected, built, and managed.





This white paper explores areas of security concern organizations must address as they move, ever-increasingly, to rely on virtualization.

READ MORE

The New IT Acronym KISSME: Keep IT Security Simple, Manageable, and Effective

The New IT Acronym KISSME: Keep IT Security Simple, Manageable, and Effective

IT has evolved immensely over the past decade, always adapting to become faster, more agile, and more efficient. Unfortunately, security threats have evolved as well, and are more stealthy, more intelligent, and more malicious than ever before.

READ MORE

Getting the most out of your cloud deployment

Getting the most out of your cloud deployment

Virtual machines in a cloud environment are as susceptible to nefarious exploitation – where sensitive data is highly valuable – as physical machines. The same exposure profile exists regardless of the underlying platform (traditional physical, virtualized, private cloud or public cloud). Although traditional security can be used in the cloud, it is neither built, nor optimized for the cloud.

READ MORE