Logo
Hamburger Menu Icon
Yoroi Background

Tag: malware

The Enigmatic “Roma225” Campaign

Introduction The Cybaze-Yoroi ZLab researchers investigated a recent espionage malware implant weaponized to target companies in the Italian automotive sector. The malware was spread through well written phishing email trying to impersonate a senior partner of one of the major Brazilian business law firms: “Veirano Advogados”. The malicious email intercepted during the CSDC operations contains […]

Read More

Dissecting the Danabot Payload Targeting Italy

Introduction In the last weeks, a new variant of infamous botnet named Danabot hit Italy. Security firms such as Proofpoint and Eset analyzed other samples of the same threat targeting the Australian landscape back in May 2018 and, more recently, in Italy . The Cybaze-Yoroi ZLab dissected one of these recent Danabot variants spread across […]

Read More

Campagna di Attacco “Invio Documenti” (Ursnif)

Proto: N031218. Con la presente Yoroi desidera informarLa relativamente ad una nuova ondata di attacco rivolta a numerose Organizzazioni pubbliche e private italiane. Gli attacchi sono portati tramite l’utilizzo di messaggi di posta fraudolenti accuratamente preparati per indurre la vittima all’apertura del documento Excel allegato, richiedendo l’abilitazione dei contenuti dinamici. Nello specifico caso la tematizzazione […]

Read More

Dissecting the MuddyWater Infection Chain

Introduction In the last days of November, some Middle East countries have been targeted by a new wave of attacks related to the Iranian APT group known as "MuddyWater": their first campaign was observed back in 2017 and more recently Unit42 researchers reported attacks in the ME area. The MuddyWater’s TTPs seem to be quite invariant […]

Read More

Dissecting the latest Ursnif DHL-Themed Campaign

Introduction In the last weeks, a new variant of the infamous Ursnif malware was discovered hitting Italian users through a malspam campaign. In fact, Yoroi-Cybaze ZLAB isolated several malicious emails having the following content: Subject: “VS Spedizione DHL AWB 94856978972 proveniente dalla GRAN BRETAGNA AVVISO DI GIACENZA” Attachment: “GR930495-30495.zip”  The content of the attachment is a […]

Read More

Attacchi Ursnif “Nuovo Documento”

Proto:  N081118. Con la presente Yoroi desidera informarLa relativamente ad una nuova ondata di attacchi diretti ad Organizzazioni ed utenze italiane. La campagna si manifesta con messaggi di posta fraudolenti contenenti link volti allo scaricamento di archivi compressi “Nuovo documento 1.zip” (analogamente a quanto osservato in N071018 e N031018). All’interno del file zip è presente uno […]

Read More

Dissecting the Mindscrew-Powershell Obfuscation

Introduction Few days ago, the CERT-Yoroi bulletin N061118 disclosed a dangerous campaign attacking several Italian users. The attack wave contained some interesting techniques need to look into further, especially regarding the obfuscation used to hide the malicious dropping infrastructure. The Yoroi-Cybaze ZLAB dissected the VBS script embedded into the zip archives delivered to the victims,  […]

Read More

The SLoad Powershell Threat is Expanding to Italy

Introduction In the past months CERT-Yoroi observed an emerging attack pattern targeting its constituency. These series of malicious email messages shared common techniques may be likely related to a single threat group starting its operation against the Italian cyber panorama. It is still not clear if these attack attempts may be originated by a well […]

Read More

Campagne di Propagazione Malware Gootkit

Proto: N061118. Con la presente Yoroi desidera informarLa relativamente ad una nuova campagna di attacco basata su email malevole dirette a numerose organizzazioni italiane. I messaggi di posta recapitati agli utenti di rete simulano risposte a richieste di preventivo, invitandoli in seguito allo scaricamento di ulteriori file attraverso appositi link inseriti nel corpo della comunicazione. […]

Read More

New “Cozy Bear” campaign, old habits

Introduction The researchers of the Yoroi-Cybaze ZLab, on 16 November, accessed to a new APT29’s dangerous malware used for the recent attacks against many important US entities, such as military agencies, law enforcement, defense contractors, media companies and pharmaceutical companies.   The Russian group spread the malware through a spear phishing attacks impersonating a State Department […]

Read More

Ondate di Attacchi Danabot

Proto: N051118. Con la presente Yoroi desidera informarLa relativamente al recente rilievo di ondate di  attacco appositamente studiate per penetrare all’interno di Organizzazioni ed utenze italiane. La campagna sfrutta messaggi di posta malevoli richiamanti problematiche di fatturazione, all’interno dei quali sono allegati archivi compressi in formato RAR capaci di infettare le vittime. Gli script vbs […]

Read More

Hunting for Sofacy: Lojax Double-Agent Analysis

Introduction A new variant of the infamous APT28 Lojax (aka Double-Agent) has been discovered by the Yoroi-Cybaze ZLab researchers. It is the latest version of the well-known rootkit Double-Agent, previously analyzed by ESET researchers. The behavior of the Lojax sample seems to be similar to the previous versions and exploits the legitimate “Absolute Lojack” software […]

Read More
1 4 5 6 7 8 14
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram