home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 377 of 523   
   Ben Ritchey to All   
   US CERT Warning   
   01 Dec 16 12:35:13   
   
   TA16-336A: Avalanche (crimeware-as-a-service infrastructure)   
      
   U.S. Department of Homeland Security US-CERT   
      
   National Cyber Awareness System:   
      
      
   TA16-336A: Avalanche (crimeware-as-a-service infrastructure)   
   12/01/2016 12:00 AM EST   
      
   Original release date: December 01, 2016   
   Systems Affected   
      
   Microsoft Windows   
   Overview   
      
   “Avalanche” refers to a large global network hosting infrastructure used by    
   cyber criminals to conduct phishing and malware distribution campaigns and    
   money mule schemes. The United States Department of Homeland Security (DHS),   
   in    
   collaboration with the Federal Bureau of Investigation (FBI), is releasing   
   this    
   Technical Alert to provide further information about Avalanche.   
   Description   
      
   Cyber criminals utilized Avalanche botnet infrastructure to host and   
   distribute    
   a variety of malware variants to victims, including the targeting of over 40    
   major financial institutions. Victims may have had their sensitive personal    
   information stolen (e.g., user account credentials). Victims’ compromised    
   systems may also have been used to conduct other malicious activity, such as    
   launching denial-of-service (DoS) attacks or distributing malware variants to    
   other victims’ computers.   
      
   In addition, Avalanche infrastructure was used to run money mule schemes where    
   criminals recruited people to commit fraud involving transporting and    
   laundering stolen money or merchandise.   
      
   Avalanche used fast-flux DNS, a technique to hide the criminal servers, behind    
   a constantly changing network of compromised systems acting as proxies.   
      
   The following malware families were hosted on the infrastructure:   
      
       Windows-encryption Trojan horse (WVT) (aka Matsnu,    
   Injector,Rannoh,Ransomlock.P)   
       URLzone (aka Bebloh)   
       Citadel   
       VM-ZeuS (aka KINS)   
       Bugat (aka Feodo, Geodo, Cridex, Dridex, Emotet)   
       newGOZ (aka GameOverZeuS)   
       Tinba (aka TinyBanker)   
       Nymaim/GozNym   
       Vawtrak (aka Neverquest)   
       Marcher   
       Pandabanker   
       Ranbyus   
       Smart App   
       TeslaCrypt   
       Trusteer App   
       Xswkit   
      
   Avalanche was also used as a fast flux botnet which provides communication    
   infrastructure for other botnets, including the following:   
      
       TeslaCrypt   
       Nymaim   
       Corebot   
       GetTiny   
       Matsnu   
       Rovnix   
       Urlzone   
       QakBot (aka Qbot, PinkSlip Bot)   
      
   Impact   
      
   A system infected with Avalanche-associated malware may be subject to   
   malicious    
   activity including the theft of user credentials and other sensitive data,   
   such    
   as banking and credit card information. Some of the malware had the capability    
   to encrypt user files and demand a ransom be paid by the victim to regain    
   access to those files. In addition, the malware may have allowed criminals    
   unauthorized remote access to the infected computer. Infected systems could    
   have been used to conduct distributed denial-of-service (DDoS) attacks.   
   Solution   
      
   Users are advised to take the following actions to remediate malware   
   infections    
   associated with Avalanche:   
      
       Use and maintain anti-virus software – Anti-virus software recognizes and    
   protects your computer against most known viruses. Even though parts of    
   Avalanche are designed to evade detection, security companies are continuously    
   updating their software to counter these advanced threats. Therefore, it is    
   important to keep your anti-virus software up-to-date. If you suspect you may    
   be a victim of an Avalanche malware, update your anti-virus software    
   definitions and run a full-system scan. (See Understanding Anti-Virus Software    
   for more information.)   
       Avoid clicking links in email – Attackers have become very skilled at    
   making phishing emails look legitimate. Users should ensure the link is    
   legitimate by typing the link into a new browser (see Avoiding Social    
   Engineering and Phishing Attacks for more information).   
       Change your passwords – Your original passwords may have been compromised    
   during the infection, so you should change them. (See Choosing and Protecting    
   Passwords for more information.)   
       Keep your operating system and application software up-to-date – Install    
   software patches so that attackers cannot take advantage of known problems or    
   vulnerabilities. You should enable automatic updates of the operating system   
   if    
   this option is available. (See Understanding Patches for more information.)   
       Use anti-malware tools – Using a legitimate program that identifies and    
   removes malware can help eliminate an infection. Users can consider employing   
   a    
   remediation tool. A non-exhaustive list of examples is provided below. The   
   U.S.    
   Government does not endorse or support any particular product or vendor.   
      
             ESET Online Scanner   
      
             https://www.eset.com/us/online-scanner/   
      
             F-Secure   
      
             https://www.f-secure.com/en/web/home_global/online-scanner   
      
             McAfee Stinger   
      
             http://www.mcafee.com/us/downloads/free-tools/index.aspx   
      
             Microsoft Safety Scanner   
      
             https://www.microsoft.com/security/scanner/en-us/default.aspx   
      
             Norton Power Eraser   
      
             https://norton.com/npe   
   References   
      
       https://www.us-cert.gov/sites/default/files/publications/money_mules.pdf   
       http://www.bankinfosecurity.com/avalanche-group-linked-to-fraud-a-2573   
      
   Revision History   
      
       December 1, 2016: Initial release   
      
   This product is provided subject to this Notification and this Privacy & Use    
   policy.   
   A copy of this publication is available at www.us-cert.gov. If you need help   
   or    
   have questions, please send an email to info@us-cert.gov. Do not reply to this    
   message since this email was sent from a notification-only address that is not    
   monitored. To ensure you receive future US-CERT products, please add    
   US-CERT@ncas.us-cert.gov to your address book.   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of:    
   United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW    
   Bldg 410 · Washington, DC 20598 · (888) 282-0870         Powered by GovDelivery   
   === Cut ===   
      
      
   ÖÄ Keep the faith, ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ·   
   ³                                                                    ³   
   ³    Ben  aka cMech  Web: http|ftp|binkp|telnet://cmech.dynip.com    ³   
   ³                  Email: fido4cmech(at)lusfiber.net                 ³   
   ³              Home page: http://cmech.dynip.com/homepage/           ³   
   ÓÄÄÄÄÄÄÄÄÄÄÄ WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1 ÄÄĽ   
      
   ... Calvin: I've changed my mind, Hobbes.  People are scum.   
   --- GoldED+/W32-MSVC v1.1.5 via Mystic BBS   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca