Researchers Uncovered C2 Infrastructure Used by Baking Malware Ursnif

by Esmeralda McKenzie
Researchers Uncovered C2 Infrastructure Used by Baking Malware Ursnif

Researchers Uncovered C2 Infrastructure Used by Baking Malware Ursnif

C2 Infrastructure Ursnif

Bridewell’s Cyber Threat Intelligence (CTI) crew has stumbled on beforehand undetected Ursnif infrastructure old in 2023 campaigns, suggesting that the malware operators have not but utilized this extremely elusive infrastructure.

Ursnif Banking Malware

Ursnif, before everything a banking trojan veritably known as Gozi, has superior into a ransomware and records exfiltration facilitator, with its most modern variant, LDR4, being identified by Mandiant in June 2022, becoming a member of the ranks of malware like:-

  • Emotet
  • Trickbot

In January 2023, a DFIR record highlighted a advertising and marketing campaign moving the Urnsnif backdoor, followed by Cobalt Strike deployment and subsequent records exfiltration, with the added use of legit RMM instruments Atera and Splashtop by the threat actor.

A phishing email used to be dropped at the Ursnif backdoor by the use of a malicious ISO file. In March 2023, eSentire documented a Google Ads advertising and marketing campaign using BatLoader to descend a complete lot of 2d-stage payloads like Redline and Ursnif disguised as legit instruments, followed by Cobalt Strike deployment for additional intrusion task in endeavor environments.

Ursnif Infrastructure Uncovered

In the pursuit of most modern Ursnif IP addresses, researchers examined recently revealed ones. They stumbled on distinctive characteristics within the associated SSL certificates, ensuing in the identification of capability trying opportunities for these addresses in the wild.

By leveraging identifiable aspects and additional requirements, experts successfully pinpointed 72 additional servers of hobby that aligned with their newly developed Ursnif trying rule, permitting them to resolve the geographical webhosting areas and webhosting suppliers associated to those servers.

image 134
Researchers Uncovered C2 Infrastructure Used by Baking Malware Ursnif 15

Right here in the below record, the total Web webhosting Companies are talked about:-

image 132
Researchers Uncovered C2 Infrastructure Used by Baking Malware Ursnif 16

Security vendors dangle but to record or detect six of the 23 Ursnif C2 servers communicating with Ursnif files, despite researchers’ diagnosis identifying their existence.

Right here below, we now dangle talked about these 6 detected C2 servers:-

  • 95[.]46[.]8[.]157
  • 193[.]164[.]149[.]143
  • Seventy 9[.]133[.]124[.]62
  • 45[.]11[.]181[.]117
  • 92[.]38[.]169[.]142
  • 31[.]214[.]157[.]31

After diagnosis, it used to be stumbled on that approximately 30% of the infrastructure revealed communication with files detected as Ursnif, with a median detection rate of easiest 4.78 in Virus Total amongst the identified Ursnif C2s; moreover, round 71.3% of the IP addresses showed no communication with any files.

image 133
Researchers Uncovered C2 Infrastructure Used by Baking Malware Ursnif 17

Ursnif, a backdoor employed by threat actors, poses a essential wretchedness to organizations as it is a gateway to ransomware and records exfiltration.

On the same time, it is veritably dispensed by malicious documents like macro-enabled situation of business files or malicious installers got by Google Advert campaigns.

Ursnif has superior from a banking trojan to assisting ransomware assaults and would possibly per chance well moreover moreover be tracked by CTI teams by its C2 infrastructure, enabling defenders to acknowledge rapidly and forestall ransomware intrusions.

Mitigations

Right here below, we now dangle talked about the total mitigations really helpful by the cybersecurity researchers:-

  • Originate obvious your staff know the risks of opening attachments despatched from unknown or suspicious sources.
  • Limit unauthorized applications from untrusted sources with an application care for watch over coverage.
  • To detect and forestall Ursnif infections, be obvious your organization makes use of the most modern version of antivirus machine and firewalls.
  • Enforce reference sets for detecting IoCs listed in the appendix.
  • To be obvious your organization is safe, it’s indispensable to place into effect a Managed Detection and Response (MDR) service that proactively monitors, detects, and responds to threats that be conscious of it.
  • Assess and remediate vulnerabilities within your organization’s network and programs with a Vulnerability Administration service.
  • Strengthen your organization’s cybersecurity posture with a Cyber Threat Intelligence (CTI) service.

Struggling to Observe The Security Patch in Your Blueprint? –
Strive All-in-One Patch Manager Plus

Source credit : cybersecuritynews.com

Related Posts