otx.alienvault.com
Open in
urlscan Pro
13.225.78.83
Public Scan
URL:
https://otx.alienvault.com/pulse/64c2532c1becc4a75d18d4a9
Submission: On July 28 via api from DE — Scanned from DE
Submission: On July 28 via api from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
× Loading... * Browse * Scan Endpoints * Create Pulse * Submit Sample * API Integration * Login | Sign Up All * Login | Sign Up * Share Actions Subscribers (318) Suggest Edit Clone Embed Download Report Spam NEW NITROGEN MALWARE PUSHED VIA GOOGLE ADS FOR RANSOMWARE ATTACKS * Created 1 day ago by dekaRituraj * Public * TLP: White A new 'Nitrogen' initial access malware campaign uses Google and Bing search ads to promote fake software sites that infect unsuspecting users with Cobalt Strike and ransomware payloads. The goal of the Nitrogen malware is to provide the threat actors initial access to corporate networks, allowing them to conduct data-theft, cyberespionage, and ultimately deploying the BlackCat/ALPHV ransomware. Today, Sophos released a report on the Nitrogen campaign, detailing how it primarily targets technology and non-profit organizations in North America, impersonating popular software like AnyDesk, Cisco AnyConnect VPN, TreeSize Free, and WinSCP. References: https://github.com/sophoslabs/IoCs/blob/master/Nitrogen%202023-07.csv https://news.sophos.com/en-us/2023/07/26/into-the-tank-with-nitrogen/ https://www.bleepingcomputer.com/news/security/new-nitrogen-malware-pushed-via-google-ads-for-ransomware-attacks/ Tags: c2 server, cobalt strike, nitrogenstager, iocs, androidhiddadt, rtfs, owassrf iocs, ransomwarehive, wormwannacry, indicator, python, python package, nitrogen, google, winscp, sophos, bing, https, music, blackcat, anydesk, example, lockbit, metasploit, beware, execution, meterpreter Industry: Technology Malware Families: Nitrogen , Meterpreter , Cobalt Strike Att&ck IDs: T1053 - Scheduled Task/Job , T1069 - Permission Groups Discovery , T1547 - Boot or Logon Autostart Execution , T1552 - Unsecured Credentials , T1553 - Subvert Trust Controls , T1574 - Hijack Execution Flow , T1583 - Acquire Infrastructure , T1584 - Compromise Infrastructure , T1588 - Obtain Capabilities , T1608 - Stage Capabilities , T1104 - Multi-Stage Channels , T1059 - Command and Scripting Interpreter , T1566 - Phishing Endpoint Security Scan your endpoints for IOCs from this Pulse! Learn more * Indicators of Compromise (184) * Related Pulses (24) * Comments (0) * History (0) CVE (4)Other (35)FileHash-SHA1 (20)FileHash-SHA256 (64)FileHash-MD5 (23)IPv4 (35) TYPES OF INDICATORS United States (19)Romania (1)Bulgaria (10)Canada (5) THREAT INFRASTRUCTURE Show 10 25 50 100 entries Search: type indicator Role title Added Active related Pulses domaintresize.comJul 27, 2023, 11:21:17 AM5domainmyponsdsoftware.comJul 27, 2023, 11:21:17 AM5domainmypondsoftware.comJul 27, 2023, 11:21:17 AM5URLhttps://winsccp.com/HPVrxkWv?[gclidJul 27, 2023, 11:21:17 AM5URLhttps://softwareinteractivo.com/streamlining-team-collaboration-the-power-of-for-seamless-file-sharing/[gclidJul 27, 2023, 11:21:17 AM5URLhttps://172.86.123.127/python/ton.zipJul 27, 2023, 11:21:17 AM3URLhttps://104.234.119.16:4425/NZAna530Nip9AWgVGZ0wvQmQqVlNzF3vDZ8VNfagijnmurLzImArKHfA/'Jul 27, 2023, 11:21:17 AM3URLhttp://mypondsoftware.com/ciscoJul 27, 2023, 11:21:17 AM5URLhttp://104.234.119.16:8880/Tu6UHNJiKqMAdBVgZOhOfQWLz0QvKbDdGjzQfqCdxVaakl7csNUiwEdQzgC_lyE/'Jul 27, 2023, 11:21:17 AM3IPv4104.234.119.16Jul 27, 2023, 11:21:17 AM5 SHOWING 1 TO 10 OF 184 ENTRIES 1 2 3 4 5 ... 19 Next COMMENTS You must be logged in to leave a comment. Refresh Comments * © Copyright 2023 AlienVault, Inc. * Legal * Status