Trelllix Threat Report Oct 2021
Trelllix Threat Report Oct 2021
THREAT
RESEARCH
REPORT
OCT 2021
REPORT
REPORT
TABLE OF CONTENTS
04 RANSOMWARE
04 Ransomware’s Increasing Prevalence
06 Thriving Ransomware Expelled from Underground Forums
Ransomware Target Sectors: The Delta of Data Between
08
Open-Source Intelligence and Telemetry
09 MITRE ATT&CK Patterns/Techniques Top Used by
Ransomware Families: Q2 2021
CLOUD THREATS
11
Cloud Threat Prevalence
11
Global Cloud Vertical Q2 2021
11
Vertical Total Cloud Incidents Global & U.S. Q2 2021
12
13 Vertical Cloud Incidents By Country: Q2 2021
18 RESOURCES
18 Twitter
We hope you enjoy this new format and welcome your feedback about
what you loved and were less enthusiastic about. More importantly,
what would you like to see in the future?
—Raj Samani
McAfee Enterprise Chief Scientist and Fellow
Twitter: @Raj_Samani
B BRAUN: UNCOVERING
VULNERABILITIES IN
GLOBALLY USED INFUSION
PUMP
CLOUD THREATS
HREATS TO COUNTRIES,
T
CONTINENTS, SECTORS,
AND VECTORS
RansomeXX
OP MITRE ATT&CK
T
TECHNIQUES Q2 2021
Netwalker RESOURCES
Thanos
MountLocker
WastedLocker
Exorcist
Conti
Maze
Q1 2021 Q2 2021
Figure 1. REvil/Sodinokibi topped our ransomware detections in Q2 of 2021, accounting for
73% of our top-10 ransomware detections.
While DarkSide and REvil stepped back into the shadows after their
high-profile attacks, an heir to DarkSide emerged in July. BlackMatter
Ransomware surfaced primarily in Italy, India, Luxembourg, Belgium,
the United States, Brazil, Thailand, the United Kingdom, Finland, and
Ireland as a Ransomware-as-a-Service affiliate program incorporating
elements from DarkSide, REvil, and Lockbit Ransomware. Based on the
code similarity of the binary and their resemblance of their public page
to DarkSide, it is common consensus that BlackMatter Ransomware is
most likely a continuation of DarkSide Ransomware—which BlackMatter
has denied.
Another “old” ransomware with a twist was discovered in mid-2021. ETTER FROM OUR CHIEF
L
LockBit 2.0 Ransomware is an updated version of 2020’s LockBit with SCIENTIST
new features that automatically encrypt devices across the domain, RANSOMWARE
exfiltrates data and accesses systems over RDP, as well as the ability
to recruit new affiliates from inside a target enterprise. B BRAUN: UNCOVERING
VULNERABILITIES IN
Ransomware developers introduced new campaigns as well. The Hive GLOBALLY USED INFUSION
ransomware family was first observed in June of 2021 with prevalence PUMP
in India, Belgium, Italy, the United States, Turkey, Thailand, Mexico, CLOUD THREATS
Germany, Colombia, and Ukraine, operating as a Ransomware-as-a-
Service written in Go language compromising healthcare and critical HREATS TO COUNTRIES,
T
CONTINENTS, SECTORS,
infrastructure organizations.
AND VECTORS
Our team takes a deeper dive into ransomware, including an OP MITRE ATT&CK
T
unexpected reaction among underground forums, targeted sectors, TECHNIQUES Q2 2021
and the delta between open-source intelligence and telemetry.
OW TO DEFEND AGAINST
H
Thriving Ransomware Expelled from Underground Forums THESE THREATS
The second quarter of 2021 was a vibrant quarter for ransomware, RESOURCES
earning its place as a high-profile cyber agenda item for the U.S.
administration. However, things have also shifted in the historically safe
cybercriminal underground forums.
A week later, two of the most influential underground forums, XSS and
Exploit, announced a ban on ransomware advertisements. For years,
these same forums provided a safe haven for cybercrime and the
ransomware boom that sparked a lively trade in breached networks,
Stealer logs, and Crypter services among others. Considering that
many of the threat actors behind the major ransomware families
are career criminals and often have a close relationship with forum
administrators and moderators, we believe that this gesture was done
to save the existence of the forums.
Even though the ransomware associated online personas were banned, ETTER FROM OUR CHIEF
L
our team has observed that the threat actors are still active on several SCIENTIST
forums under different other personas. RANSOMWARE
B BRAUN: UNCOVERING
VULNERABILITIES IN
GLOBALLY USED INFUSION
PUMP
CLOUD THREATS
HREATS TO COUNTRIES,
T
CONTINENTS, SECTORS,
AND VECTORS
OP MITRE ATT&CK
T
TECHNIQUES Q2 2021
Figure 2. The Admin of XSS calling for the ban on Ransomware.
OW TO DEFEND AGAINST
H
During this period, the Babuk ransomware group was going through THESE THREATS
their own issues, one of which, a defect *nix ESXi locker, we have
RESOURCES
described extensively in our blog.
RANSOMWARE
Many ransomware crews have portals in which they announce the
victims they have breached and samples of data they have gathered B BRAUN: UNCOVERING
to force the victims to pay the ransom. If they don’t pay, their data will VULNERABILITIES IN
be leaked, and in some cases, sold. Leak sites are showcases of failed GLOBALLY USED INFUSION
negotiations and do not reflect the full extent of attacks executed by PUMP
the ransomware crews, however insights into reported sectors and CLOUD THREATS
geo’s are interesting data to observe.
HREATS TO COUNTRIES,
T
Our team monitors many of those pages and gathers the ransomware CONTINENTS, SECTORS,
family name and maps victim to sector and country. Gathering this AND VECTORS
data and compile, we observe the following ransomware families OP MITRE ATT&CK
T
targeting the below top 10 sectors in the United States: TECHNIQUES Q2 2021
Government
OW TO DEFEND AGAINST
H
THESE THREATS
RESOURCES
Telecom
Energy
Industrial
Education
Technology
Finance
Q1 2021 Q2 2021
Figure 3. Government was the sector most targeted by ransomware in Q2 of 2021, followed
by Telecom, Energy, and Media and Communications.
Our telemetry point of view, gathered from U.S. sensors, mapped ETTER FROM OUR CHIEF
L
ransomware activity observed and against the Open-Source SCIENTIST
Intelligence (OSINT) reported sectors: RANSOMWARE
OW TO DEFEND AGAINST
H
Figure 4. The more distance between the two sectors, the better they are protected. the THESE THREATS
closer the distance, the more the sector needs to pay attention to the risk of ransomware.
RESOURCES
What does the difference mean? What is the delta? From our
telemetry perspective, we observe ransomware activity that has
been detected and blocked in the sector where we have customers.
Identifying Government as the No. 1 targeted sector in our telemetry
reveals the many attempts targeted toward this sector that are NOT
successful. In the OSINT-reported sectors, we observe that sectors
requiring high demands on IT service capabilities to support critical
business services are high on the target list of ransomware crews.
Figure 5. Data Encrypted for Impact was the most detected attack pattern in Q2 2021.
B Braun: Uncovering Vulnerabilities in Globally Used Infusion ETTER FROM OUR CHIEF
L
Pump SCIENTIST
RANSOMWARE
The medical industry is faced with unique security challenges. Potential
attacks on medical centers could amount to an even bigger threat B BRAUN: UNCOVERING
than a system-wide ransomware assault. Our team, in partnership with VULNERABILITIES IN
Culinda, discovered a set of vulnerabilities in B. Braun Infusomat Space GLOBALLY USED INFUSION
PUMP
Large Pump and the B. Braun SpaceStation.
CLOUD THREATS
Our research led us to discover five previously unreported
vulnerabilities in the medical system which include: HREATS TO COUNTRIES,
T
CONTINENTS, SECTORS,
1. CVE-2021-33886: Use of Externally-Controlled Format String (CVSS AND VECTORS
7.7)
OP MITRE ATT&CK
T
2. CVE-2021-33885: Insufficient Verification of Data Authenticity TECHNIQUES Q2 2021
(CVSS 9.7) OW TO DEFEND AGAINST
H
THESE THREATS
3. CVE-2021-33882: Missing Authentication for Critical Function (CVSS
8.2) RESOURCES
Our team’s cloud threat research found that Financial Services faced CLOUD THREATS
the greatest challenge against cloud threat campaigns in Q2 of 2021.
HREATS TO COUNTRIES,
T
CONTINENTS, SECTORS,
Most Common Cloud Threats Q2 2021
AND VECTORS
1. Excessive Usage From Anomalous Location
OP MITRE ATT&CK
T
2. Insider Data Exfiltration
TECHNIQUES Q2 2021
3. Privilege Access Misuse
OW TO DEFEND AGAINST
H
4. High Risk Data Exfiltration THESE THREATS
5. Privilege Access Exfiltration
RESOURCES
6. Land Expand Exfiltration
7. Suspicious Superhuman
8. Data Exfiltration by Privileged User
Table 1. Excessive Usage From Anomalous Location definition: The user has accessed or
downloaded a very large volume of data within a short span of time. This is severe because
1) Enterprise users have previously never accessed such a large volume, and 2) Data volume
is high even when referenced to a large pool of users. Excessive Usage From Anomalous
Location threats ranked highest among Global Cloud Threats, followed by Insider Data
Exfiltration and Privilege Access Misuse. Excessive Usage From Anomalous Location
composed 62% of threats recorded.
Enterprise
1. Financial Services
2. Healthcare
3. Manufacturing
4. Retail
5. Professional Services
6. Travel & Hospitality
7. Software & Internet
8. Technology
9. Computers & Electronics
10. Non-Profit Organization
Table 2. Financial Services were targeted most among reported cloud incidents, followed
by Healthcare, Manufacturing, Retail, and Professional Services. Cloud incidents targeting
the Financial Services accounted for 33% of the top 10 industries reported, followed by
Healthcare and Manufacturing (8%).
Vertical Total Cloud Incidents Global and U.S. Q2 2021 ETTER FROM OUR CHIEF
L
SCIENTIST
Global Cloud Vertical Country
RANSOMWARE
1. Financial Services U.S.
2. Financial Services Singapore B BRAUN: UNCOVERING
VULNERABILITIES IN
3. Healthcare U.S. GLOBALLY USED INFUSION
4. Retail U.S. PUMP
Table 4. Financial Services were the top target of cloud threat incidents in the U.S. in Q2 of
2021. Incidents targeting Financial Services represented 29% of total cloud incidents among
top 10 sectors.
T
hreats To Countries, Continents, Sectors, And Vectors
Top
Mitre Att&Ck Techniques Q2 2021 ETTER FROM OUR CHIEF
L
SCIENTIST
Techniques
Tactics (Top 5 per Tactic) Comments RANSOMWARE
Initial Access Spearphishing Spear Phishing (Link and Attachment) is sharing the
Attachment top 3 Initial Access Techniques with Exploiting B BRAUN: UNCOVERING
Public-facing Application. VULNERABILITIES IN
Exploit Public-Facing GLOBALLY USED INFUSION
Application PUMP
Spearphishing Link
CLOUD THREATS
Valid Accounts
RESOURCES
Brush up on how you can block all those annoying popups from your HREATS TO COUNTRIES,
T
browser and how our customers are protected from malicious sites CONTINENTS, SECTORS,
via Web Advisor and Web Control. AND VECTORS
B BRAUN: UNCOVERING
MVISION Insights Preview Dashboard—Explore a preview of the only
VULNERABILITIES IN
proactive solution to stay ahead of emerging threats. GLOBALLY USED INFUSION
PUMP
McAfee Threat Center—Today’s most impactful threats have been
identified by our team. CLOUD THREATS
RESOURCES
Douglas McKee