
Defending against doxing
In this Studio 471, Jacob Larsen discusses the effects of doxing, how sites like Doxbin take advantage of legal loopholes and how to defend against being doxed.
After months of inactivity, hacking group TA505's Get2 Loader has sprung back into operation, possibly signaling that the group is ready for a new round of malicious activity.
On December 14, 2020, the Get2 loader had resurfaced with new download and execute configuration parameters named "LD" and "ED." Intel 471 last observed the loader in operation on September 14, 2020.
The "LD" parameter reflectively loads a downloaded dynamic-link library (DLL) file into the address space of the current process and calls its entry point. The "ED" parameter copies the DLL into executable memory and invokes the entry point directly. The preexisting "RD" parameter that was used to inject the downloaded DLL into EXCEL.EXE can now perform injection into WINWORD.EXE as well.
The reconfigured loader is meant to allow the group to carry out its operations without drawing the attention of enterprise defenses. In the past, it has been used to download the SDBbot, FlawedGrace and other malware.
TA505 is a prolific Russian-speaking, financially-motivated group that is known for launching large-scale targeted attacks. The group was most recently discovered going after German-speaking targets with weaponized CVs. Intel 471 also observed the group going after targets in Japan, South Korea, United Arab Emirates in 2019. Once the group's malware or actions are caught by researchers or the press, the group tends to go silent in an effort to reconfigure its tools.
Drawing from past experiences, Intel 471 believes that new, undiscovered malware campaigns will follow with the introduction of the reconfigured Get2 Loader.
"TA505 can be somewhat deliberate in how they operate, more so than most of the financially-motivated groups we track," said Intel 471 COO Jason Passwaters. "Once things start ramping up like this, rest assured they are back at it with a target list in hand."
The Intel 471 adversary intelligence on major threat groups such as TA505 and our unique insight into its capabilities, intent and motivations, can be leveraged by threat intelligence teams to remain proactive and resilient against attacks as cybercriminals modify TTPs.
In this Studio 471, Jacob Larsen discusses the effects of doxing, how sites like Doxbin take advantage of legal loopholes and how to defend against being doxed.
The leader of the Black Basta ransomware group employed a trusted, experienced cybercrime actor nicknamed Tinker who he relied on for phishing content, call center management and negotiation skills.
The DanaBot malware was severely disrupted by law enforcement. Here's an in-depth look at this data-stealing workhorse for the cybercriminal underground.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.