Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Cyber Intelligence

Ankura Cyber Threat Intelligence Bulletin [Report] – Security

admin by admin
Dec 21, 2022
in Cyber Intelligence
0 0
A A
0
FacebookTwitterLinkedIn

20 December 2022


Ankura Consulting Group LLC



To print this article, all you need is to be registered or login on Mondaq.com.

Each month, the Ankura Cyber Threat Investigations & Expert
Services (CTIX) team compiles and provides a thorough analysis of
the latest threats, adversary techniques, and trends into an
in-depth report called the Cyber Threat Intelligence Bulletin.

Updated for October – November 2022, this report provides an
in-depth look at current global threats and key cyber trends to
watch to help prepare your organization for potential threats.

Access the complimentary threat report and
expert analysis of tactics and adversary techniques
>


1262650a.jpg

The summary below includes a preview of the key threat topics
from this month’s Intelligence Bulletin.

Coordinated SEO Poisoning Redirect Campaign Hacked Thousands of
Websites

A massive SEO poisoning campaign has compromised almost 15,000
WordPress sites with redirect links that send the user to
actor-controlled sites like Q&A forums. The motivations of the
threat actors involved are to boost the fake website rankings in
Google. So, as multiple IPs from all over the world interact with
the compromised site, the website’s ranking in Google Search
increases, leading even more unsuspecting users to the redirected
domain.

1262650b.jpg

Figure 1. Redirect to a Q&A Forum

What Happened to Raidforums?

Two new active successor sites have emerged in the wake of the
Raidforums takedown in February 2022, “Breached[.]co,”
also known as “BreachedForum.” and
“raidforums2[.]com” also known as “Raid2.”
BreachedForum appears to be the most popular direct successor to
Raidforums thus far while Raid2 appears to have been created by a
pro-Ukrainian group and has seen a slower growth rate and less
activity. Raidforum users have also appeared to migrate to other
well-known and previously established forums with new users spiking
in the ten (10) days following the Raidforum seizure.

Recent Cyber Threats Surrounding Twitter

Elon Musk became the owner and CEO of Twitter in October 2022,
creating a new verification system in November for high-profile
accounts called Twitter Blue. After the rollout of the program, an
exponential uptick in account impersonation was quickly observed.
Impersonation and inauthentic account services/tools found on dark
web forums are not new to the landscape but can be utilized further
with the platform’s recent changes. New phishing campaigns are
also emerging and taking advantage of Twitter Blue.

1262650c.jpg

Figure 2: Account Takeover Forum Posting

“From Russia with Love”: Somnia Ransomware
Overview

“From Russia with Love” (FRwL), a Russian hacktivist
group tracked as UAC-0118, has infected various Ukrainian
organizations with a new ransomware strain dubbed
“Somnia.” Somnia ransomware is similar to wiper malware,
where there are no instructions for payment to decrypt the
encrypted data. The purpose of wiper malware is purely to destroy
as much data as possible.

1262650d.jpg

Figure 1: Example of the fake Advanced IP Scanner Program
Used

Threat Actor of the Month: Potential Return of Once Dormant
Team TNT

TeamTNT recently pinged several Docker endpoints, showing
activity from the group after its reported shutdown in 2021. Known
WatchDog (Thief Libra) indicator of compromise uncovered in Base64
code, showing possible affiliation to the attack. While
unconfirmed, this security event could be an indication of the
return of TeamTNT, or a potential takeover by another threat
organization.

1262650e.jpg

Figure 1: TeamTNT Website (December 25, 2021)

Trending Indicators of Compromise (IOCs)

IOCs can be utilized by organizations to detect security
incidents more quickly as indicators may not have otherwise been
flagged as suspicious or malicious. Download the full bulletin for
a list of technical indicators of compromise within the past sixty
(60) days that are associated with monitored threat groups and/or
campaigns of interest.

The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.

POPULAR ARTICLES ON: Technology from United States

Amazon To Roll Out “AI Nutrition Cards”

Foley & Lardner

Hidden discrimination of AI systems continues to be a concern for the world. Various privacy laws, like the GDPR, already provide a right to not be subject to automated decision-making…

OCC Announces Examination Priorities For 2023

Phelps Dunbar

Earlier this month the Office of the Comptroller of the Currency released its Supervision Operating Plan for 2023, setting out its risk-based examination priorities for national banks.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally
Cyber Intelligence

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally

Palo Alto Networks and TELMEX-Scitum Reinforce Their Commitment to Offer Extended Managed Detection and Response (XMDR)
Cyber Intelligence

Palo Alto Networks and TELMEX-Scitum Reinforce Their Commitment to Offer Extended Managed Detection and Response (XMDR)

Using real-time data platforms to plug cybersecurity skills gap
Cyber Intelligence

Using real-time data platforms to plug cybersecurity skills gap

Trace3, ExtraHop Launch Managed Detection and Response (MDR) Services
Cyber Intelligence

Trace3, ExtraHop Launch Managed Detection and Response (MDR) Services

Spain: Rights experts call for probe into claim Catalan leaders were spied on
Cyber Intelligence

Spain: Rights experts call for probe into claim Catalan leaders were spied on

Enterprise Exposure to Cyberattacks Vastly Elevated with Increased Dependency on Third-Party Partners
Cyber Intelligence

Enterprise Exposure to Cyberattacks Vastly Elevated with Increased Dependency on Third-Party Partners

How Do Threat Hunters Keep Organizations Safe?
Cyber Intelligence

How Do Threat Hunters Keep Organizations Safe?

Cyber Threat Intelligence Services Market to Witness Huge
Cyber Intelligence

Cyber Threat Intelligence Services Market to Witness Huge

APT groups use ransomware TTPs as cover for intelligence gathering and sabotage
Cyber Intelligence

APT groups use ransomware TTPs as cover for intelligence gathering and sabotage

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know

What Security Leaders Need to Know

Iran launched a Cyberattack Against Critical Infrastructure in Israel

Iran launched a Cyberattack Against Critical Infrastructure in Israel

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
  • Popular VPN Software Flaw Let Attackers Crash the Systems
  • Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.