www.ironnet.com
Open in
urlscan Pro
2606:2c40::c73c:67fe
Public Scan
URL:
https://www.ironnet.com/blog/detecting-a-mummyspider-campaign-and-emotet-infection
Submission: On August 09 via api from US — Scanned from DE
Submission: On August 09 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM/hs-search-results
<form action="/hs-search-results">
<input type="text" class="hs-search-field__input" name="term" autocomplete="off" aria-label="Search" placeholder="Search">
<input type="hidden" name="type" value="SITE_PAGE">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="type" value="LISTING_PAGE">
<button aria-label="Search"><span id="hs_cos_wrapper_module_16508916385963_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_icon" style="" data-hs-cos-general-type="widget" data-hs-cos-type="icon"><svg version="1.0"
xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" aria-hidden="true">
<g id="search1_layer">
<path
d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
</path>
</g>
</svg></span></button>
</form>
Text Content
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy. If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked. Accept Decline * Why IronNet * * Use Cases See how organizations benefit from IronNet * Customer Testimonials See how customers benefit from IronNet * Industry Recognition Discover what industry analysts are saying about Collective Defense and IronNet * For SOC Analysts Reduce alert fatigue and build a more proactive defense * For CISOs Maximize current investments and strengthen your security posture * * NBH Bank draws on IronNet behavioral analytics for advanced threat detection Case Study Learn more * Platform * * Collective Defense Platform Leverage NDR powered by behavioral analytics and crowdsourced attack intelligence to secure your enterprise network Learn more * Training * * A practical way to rule out false positives Ebook Read more * Industries * * Financial Sector * Defense * Healthcare * Public Sector * Energy & Utilities * Space * * Building a secure utility ecosystem with NDR and Collective Defense White paper Read more * Company * * About * Leadership * Partners * News * * Blog * Careers * Investor Relations * * 8 Top Security Challenges eBook ...and ways IronNet customers are solving them Download * Resources * * Events * Webinars * Blog * Resource library * Trending topics * Biden Cyber EO * Cloud security * Collective defense * Cyber analytics * Cyber defense * Cyber risk * Cybersecurity strategy * Enterprise security * Extended Detection & Response (XDR) * MITRE ATT&CKⓇ Framework * Network Detection and Response (NDR) * Network security * Ransomware * Secure your supply chain * Security operations center (SOC) * Threat intelligence in cybersecurity * Biden Cyber EO * Cloud security * Collective defense * Cyber analytics * Cyber defense * Cyber risk * Cybersecurity strategy * Enterprise security * Extended Detection & Response (XDR) * MITRE ATT&CKⓇ Framework * Network Detection and Response (NDR) * Network security * Ransomware * Secure your supply chain * Security operations center (SOC) * Threat intelligence in cybersecurity * IronNet Threat Intelligence Hub * * Biden Cyber EO * Cloud security * Collective defense * Cyber analytics * Cyber defense * Cyber risk * Cybersecurity strategy * Enterprise security * Extended Detection & Response (XDR) * MITRE ATT&CKⓇ Framework * Network Detection and Response (NDR) * Network security * Ransomware * Secure your supply chain * Security operations center (SOC) * Threat intelligence in cybersecurity * * IronNet's May Threat Intelligence Brief 2022 THREAT INTEL BRIEFS At IronNet, we look to behavioral analytics to detect unknown threats on enterprise networks Read more * Request Demo Select LanguageArabicChinese (Simplified)EnglishFrenchGermanJapaneseSpanish Powered by Google Übersetzer * Why IronNet * * Use Cases See how organizations benefit from IronNet * Customer Testimonials See how customers benefit from IronNet * Industry Recognition Discover what industry analysts are saying about Collective Defense and IronNet * For SOC Analysts Reduce alert fatigue and build a more proactive defense * For CISOs Maximize current investments and strengthen your security posture * * NBH Bank draws on IronNet behavioral analytics for advanced threat detection Case Study Learn more * Platform * * Collective Defense Platform Leverage NDR powered by behavioral analytics and crowdsourced attack intelligence to secure your enterprise network Learn more * Training * * A practical way to rule out false positives Ebook Read more * Industries * * Financial Sector * Defense * Healthcare * Public Sector * Energy & Utilities * Space * * Building a secure utility ecosystem with NDR and Collective Defense White paper Read more * Company * * About * Leadership * Partners * News * * Blog * Careers * Investor Relations * * 8 Top Security Challenges eBook ...and ways IronNet customers are solving them Download * Resources * * Events * Webinars * Blog * Resource library * Trending topics * Biden Cyber EO * Cloud security * Collective defense * Cyber analytics * Cyber defense * Cyber risk * Cybersecurity strategy * Enterprise security * Extended Detection & Response (XDR) * MITRE ATT&CKⓇ Framework * Network Detection and Response (NDR) * Network security * Ransomware * Secure your supply chain * Security operations center (SOC) * Threat intelligence in cybersecurity * Biden Cyber EO * Cloud security * Collective defense * Cyber analytics * Cyber defense * Cyber risk * Cybersecurity strategy * Enterprise security * Extended Detection & Response (XDR) * MITRE ATT&CKⓇ Framework * Network Detection and Response (NDR) * Network security * Ransomware * Secure your supply chain * Security operations center (SOC) * Threat intelligence in cybersecurity * IronNet Threat Intelligence Hub * * Biden Cyber EO * Cloud security * Collective defense * Cyber analytics * Cyber defense * Cyber risk * Cybersecurity strategy * Enterprise security * Extended Detection & Response (XDR) * MITRE ATT&CKⓇ Framework * Network Detection and Response (NDR) * Network security * Ransomware * Secure your supply chain * Security operations center (SOC) * Threat intelligence in cybersecurity * * IronNet's May Threat Intelligence Brief 2022 THREAT INTEL BRIEFS At IronNet, we look to behavioral analytics to detect unknown threats on enterprise networks Read more * Request Demo Select LanguageArabicChinese (Simplified)EnglishFrenchGermanJapaneseSpanish YES Back to IronNet Blog Threat Research DETECTING A MUMMY SPIDER CAMPAIGN AND EMOTET INFECTION By IronNet Threat Research with lead contributions by Blake Cahen * * * Share May 11, 2022 Key findings: * At the start of the Eid Al-Fitr (Islamic holiday) weekend in early May 2022, IronNet Threat Research detected a thread hijacking attack carrying Emotet malware against an organization located in the Asia Pacific region. * This cyber attack is likely part of a new campaign by the MUMMY SPIDER threat group, designed to test a new bypass for Microsoft disabling macros by default for use in future large-scale campaigns. * This finding supports recent open-source reporting that MUMMY SPIDER has begun to conduct more targeted operations, and it is likely the threat actors will continue to use their access to enterprise emails to conduct further phishing attacks. IronNet’s Network Detection and Response (NDR) platform, in combination with our cybersecurity experts, detected an Emotet infection in the network of a customer located in the Asia Pacific region at the start of the Eid Al-Fitr (Islamic holiday) weekend in early May 2022. We were able to detect the aftermath of a successful phishing attack against an employee at the company, which resulted in an infection of a host in the client enterprise by Emotet malware. While we are still working with our partner to assist in triage and remediation, we wanted to share our findings to increase the communities ability to collectively defend against these types of attacks. We posit that this attack is part of a new campaign by the MUMMY SPIDER threat group, designed to test updated techniques, tactics, and procedures (TTP) for future campaigns. This article discusses the threat group behind the attack and breaks down the post-compromise activity that occurred within the client enterprise. This attack bypassed the client enterprise’s anti-virus protection and security products; however, IronNet’s behavioral analytics were able to detect the post-compromise activity and quickly alert the customer to the infection. MUMMY SPIDER RETURNS MUMMY SPIDER (also known as TA54) is a threat group that utilizes various malicious spam (malspam) email campaigns to deploy Emotet malware. First detected in 2014, Emotet is a modular, polymorphic trojan that is capable of evading signature-based detection and spreading throughout a victim network to compromise additional systems. Emotet often serves as a first–or second–stage malware that can drop and download further payloads, which could ultimately lead to data theft, remote control of systems, financial losses, and operational disruptions. An international law enforcement effort succeeded in taking down the Emotet botnet in 2021, but it has since resurfaced with a new focus on targeted attacks rather than the previous “spray and pray” tactics it was once known for. We cannot claim with absolute certainty that the group is linked to Russia; however, on April 20th 2022, a joint alert issued by cybersecurity agencies from Australia, Canada, New Zealand, the U.S., and the U.K. mentioned the MUMMY SPIDER threat group when warning organizations of the threat of Russian cyber attacks on critical infrastructure. Unlike most threat groups, MUMMY SPIDER operates atypically; they will hibernate for months at a time and conduct operations in short bursts over a several month period. Additionally, recent reports attributed to this group have coincided with holiday seasons. Historically, when the group resumed operations, they utilized new variants of Emotet in an attempt to bypass security efforts. In the case of the compromise detailed in this article, we believe that the MUMMY SPIDER threat group may have been testing a new bypass for Microsoft disabling macros by default. This capability involves using OneDrive URLs or XLL files instead of traditional macro-enabled documents. ProofPoint believes that the reason for the lower-than-normal target volume is because MUMMY SPIDER is testing the success of this new technique before adopting it on a larger scale. BEHAVIORAL DETECTION AND INCIDENT ANALYSIS On April 29th, 2022, at 0100UTC, an enterprise user received a phishing email with a zip file attached. The archive contained an XLL file that the victim accidentally executed on the host computer. This triggered a series of requests to multiple external domains, which hosted the new Emotet malware. While a majority of these outbound requests were blocked by enterprise security products, an outbound session succeeded to gla[.]ge:80/old/PuVaff/ at 0151UTC and a DLL (Emotet) was downloaded. The sample was not flagged as malicious by VirusTotal at the time of detection. IronNet observed the host making a large volume of outbound requests to various remote servers in an attempt to establish command and control (C2) communications. Similar to the domain requests, a majority of these attempts were blocked, but a small number were successful. IronDefense was able to generate alerts based on the anomalous nature of the domains, two instances of C2 beaconing activity, and numerous threat-intelligence-based alerts. After reporting this activity to the customer, we were informed that the attack occurred on the Friday before a major holiday weekend; this suggests a potential attack of opportunity, which corroborates with the new TTP that MUMMY SPIDER is assumed to be operating under. IronNet was able to alert the customer shortly after their workday ended Friday, enabling isolation of the infected host and mitigation during the long weekend. There is no evidence of lateral movement attempts from the infected host, supporting the assessment that this was isolated and thus part of MUMMY SPIDER’s new test campaign model. THREAD HIJACKING After initial triage, IronNet’s threat hunters and intel analysts requested a copy of the phishing email used and were able to categorize this as a thread hijacking attack. Thread Hijacking is a process in which a threat actor compromises and injects themselves into an email thread in an effort to increase legitimacy and trust. In this instance, the actors leveraged an email chain that involved updating a spreadsheet of delivery information, providing a legitimate use case for the phishing target to open the attached file. While the sender's address was not from a legitimate enterprise domain, the email was able to avoid suspicion from the user. When we categorized this as a thread hijacking attack, we uncovered additional concerns that we began to investigate. Palo Alto released an article in 2020 detailing this type of attack, which indicates the post-infection goal is exfiltrating host data via C2. This discovery suggests the enterprise user was likely targeted, evidenced by the email being sent specifically to the user. We were able to use this information to inform the customer that there were likely additional infections of one or more personnel from the original email chain, making them aware of additional thread hijacking attacks that would be likely using emails from the victim user. IronNet conducted a review of indicators of compromise (IOC) associated with recent MUMMY SPIDER campaigns and identified external scanning attempts against several enterprise customers. While most of these appeared to be generic scanning, one instance involved a large volume of scanning against customer Simple Mail Transfer Protocol (SMTP) servers. We conclude this was likely an attempt to identify more malspam targets. IronNet has since deployed Threat Intelligence Rules (TIR) and propagated the incident alerts throughout the IronDome, enabling other IronNet customers to have increased detection capability and reduced response time through collective defense. CONCLUSION Recent reporting indicates that MUMMY SPIDER and other actors that use Emotet have begun to conduct more targeted operations, increasing the likelihood of spear-phishing against enterprise employees. While preventing all enterprise users from being the victim of a phishing attack would be ideal, it is statistically unlikely. Awareness training is recommended and effective, but having additional layers of security in the event of compromise is critical. This incident highlights the importance of behavioral detections as threat actors work to evade traditional security tools and signature-based detections. IronNet’s ability to detect the behavioral aspects of this attack prevented the threat group from having extended access to the customer’s enterprise over a long weekend and potentially causing further damage. IOCS URLs: * gakudou[.]com:80/photo06/hEu/ * giasotti[.]com:80/js/Khc6mb0zx4KoWX/ * plresende[.]com:80/pcinfor/cq/ * thomasmanton[.]com:80/wp-includes/owZnpWmH4D8j/ * gla[.]ge:80/old/PuVaff/ * gccon[.]in/UploadedFiles/UYtJNrT2llxy1/ Extract from C2 Config via Tria.ge * 176.31.73.90:443 * 45.76.159.214:8080 * 138.197.147.101:443 * 104.168.154.79:8080 * 149.56.131.28:8080 * 5.9.116.246:8080 * 77.81.247.144:8080 * 172.104.251.154:8080 * 50.30.40.196:8080 * 173.212.193.249:8080 * 51.91.76.89:8080 * 197.242.150.244:8080 * 103.75.201.2:443 * 51.254.140.238:7080 * 79.137.35.198:8080 * 72.15.201.15:8080 * 27.54.89.58:8080 * 189.126.111.200:7080 * 196.218.30.83:443 * 82.165.152.127:8080 * 164.68.99.3:8080 * 183.111.227.137:8080 * 167.172.253.162:8080 * 153.126.146.25:7080 * 129.232.188.93:443 * 151.106.112.196:8080 * 188.44.20.25:443 * 167.99.115.35:8080 * 134.122.66.193:8080 * 185.4.135.165:8080 * 212.24.98.99:8080 * 51.91.7.5:8080 * 146.59.226.45:443 * 131.100.24.231:80 * 212.237.17.99:8080 * 201.94.166.162:443 * 45.176.232.124:443 * 159.65.88.10:8080 * 160.16.142.56:8080 * 216.158.226.206:443 * 203.114.109.124:443 * 103.43.46.182:443 * 46.55.222.11:443 * 209.126.98.206:8080 * 91.207.28.33:8080 * 1.234.2.232:8080 * 45.118.115.99:8080 * 206.189.28.199:8080 * 94.23.45.86:4143 * 158.69.222.101:443 * 103.70.28.102:8080 * 101.50.0.91:8080 * 58.227.42.236:80 * 119.193.124.41:7080 * 107.182.225.142:8080 * 185.157.82.211:8080 * 45.235.8.30:8080 * 103.132.242.26:8080 * 1.234.21.73:7080 * 110.232.117.186:8080 * 209.97.163.214:443 * 185.8.212.130:7080 * 209.250.246.206:443 Tria.ge: * https://tria.ge/220428-23e5saffg3/behavioral1#report IRONNET ANALYTICS MAPPED TO MITRE TTPS MITRE ATT&CK IronNet Analytic Tactic Technique Consistent Beaconing HTTP/TLS Command and Control Application Layer Protocol Domain Analysis HTTP/TLS Command and Control Application Layer Protocol ABOUT IRONNET Founded in 2014 by GEN (Ret.) Keith Alexander, IronNet, Inc. (NYSE: IRNT) is a global cybersecurity leader that is transforming how organizations secure their networks by delivering the first-ever Collective Defense platform operating at scale. Employing a number of former NSA cybersecurity operators with offensive and defensive cyber experience, IronNet integrates deep tradecraft knowledge into its industry-leading products to solve the most challenging cyber problems facing the world today. Back to IronNet Blog Talk to an expert * Why Ironnet * Use Cases * Recognition * For SOC Analysts * For CISOs * Platform * IronDefense * IronDome * Industries * Enterprise * Defense * Healthcare * Government * Energy & Utilities * Services * Governance and Maturity Services * Cybersecurity Readiness Services * Incident Response Services * Enterprise Security Program Review * Training * Company * About * Leadership * Certifications * Partners * News * Blog * Careers * Customer Support * Knowledge base * Learn * Events * Webinars * Resource Library * Contact Us © 2022 IronNet, Inc. All Rights Reserved. | Privacy Statement | Terms of Use | Sitemap Login Talk to an expert * Why Ironnet * Use Cases * Recognition * For SOC Analysts * For CISOs * Industries * Enterprise * Defense * Healthcare * Government * Energy & Utilities * Company * About * Leadership * Certifications * Partners * News * Blog * Careers * Login * Contact Us * Customer Support * Platform * IronDefense * IronDome * Services * Governance and Maturity Services * Cybersecurity Readiness Services * Incident Response Services * Enterprise Security Program Review * Training * Learn * Events * Webinars * Resource Library © 2022 IronNet, Inc. All Rights Reserved. | Privacy Statement | Terms of Use | Sitemap ORIGINALTEXT Bessere Übersetzung vorschlagen --------------------------------------------------------------------------------