The PRODAFT Threat Intelligence (PTI) Team has uncovered a global cyber espionage campaign, which has strong ties with the SolarWinds attack and the EvilCorp.
Victims include dozens of Fortune 500 companies, a three-letter US organization, and various ministries/departments (from the U.S. and the E.U.) that have previously admitted to being breached.
The report also features the "Modus Operandi" of the attackers, which is found to be as exciting as the technical aspects as well. We have notified several CERTs and LE bodies around the world, and involved victims in their area of authority.
We would like to state that we have intentionally avoided making any attributions in our report regarding the SilverFish. This is due to the fact that we believe these kinds of assumptions can easily be transformed into baseless hype in the media in a way that shadows the research we have put in.
Finally, we would like to present our deepest gratitude to our advisors (Jean-Christophe Le Toquin, Senad Aruc, Nils Roald), partners, the national CERT of Switzerland, and especially the cantonal police force of Vaud for their timely support and dedication.
Wazawaka has recently risen to prominence within the Threat Intelligence (TI) community, emerging as a key player in the dynamic digital threat landscape. Wazawaka is currently under scrutiny for his alleged involvement in cybercriminal activities, prompting concerns across the cyber realm.
This research provides a comprehensive analysis of Wazawaka’s background, affiliations, and tactics in the threat landscape associated with his activities. It includes information about Wazawaka’s team and his close relations with other threat actors.
The structure of Wazawaka’s team and its choice of third-party ransomware-as-a-service vendors provide in-depth insights into the current state of the cybercriminal industry as a whole. This research is vital for information security leaders who wish to improve their risk management models and boost cyber resilience against sophisticated threats.
This report explores the operational environment of the Nomadic Octopus espionage group's Tajikistan Campaign: Paperbug.
According to victim analysis, the group targets high-ranking government officials, telecommunication services, and public service infrastructures. The types of compromised machines range from individuals' computers to OT devices. These targets make operation "Paperbug" intelligence-driven.
The environment itself is built with fundamental functionality. This makes the attribution challenging; it leaves little room for comments. However, the findings were sufficient to profile this group in this case.
RIG EK is a financially-motivated program that has been active since 2014. Although it has yet to substantially change its exploits in its more recent activity, the type and version of the malware the threat actors distribute constantly change. The frequency of updating samples ranges from weekly to daily updates.
This report aims to provide insight into how RIG EK operates, what kinds of malware it distributes, and how the distribution happens.
The PTI team has identified and gained visibility of the infrastructure of RKIT, which revealed threat actors’ inner workings and their identities.
The highly active threat group FIN7 has been continuously broadening its cybercrime horizons and recently added ransomware to its attack arsenal.
FIN7 group is known to hold a notorious status due to their achievement in deploying extensive backdoors in leveraging software supply chains, distributing malicious USB sticks, and cooperating with other groups.
PTI team obtained visibility into the inner workings of the FIN7 threat group and managed to gain information about their organizational structures, identities, attack vectors, infrastructures, proof-supported affiliations with other ransomware groups (such as DarkSide, who were behind the Colonial Pipeline attack in 2021), victim targeting, and other relevant observations. All of the findings are supported by translated conversations among the members of FIN7, including screenshots of their infrastructures.
You can download the full version of the report and the summary of the most important findings.