Cyber Security Report Accenture 1571448013
Cyber Security Report Accenture 1571448013
Cyber Security Report Accenture 1571448013
CYBER
THREATSCAPE
REPORT
CONTENTS
EXECUTIVE SUMMARY 4
WHAT’S INSIDE? 8
A SECURITY PIVOT 90
GLOSSARY 93
CONTACTS 99
In the face of growing cybercrime, there are few deterrents more effective than hitting
attackers where it hurts most—in their own wallets. The more organizations invest in
securing their networks and training their staff on how to safely navigate the digital
workplace, the harder and more expensive it becomes for threat actors to disrupt or
breach networks.
But reducing any return on cybercriminals’ own investments or cutting into their profits,
is only effective if they maintain the status quo—and many do not. Far from being
overwhelmed by hardening environments, threat actors are proving their confidence as
chameleons. As threat actors face effective defenses to tried and tested attack vectors,
they adapt and switch to try out new tactics, techniques and procedures (TTPs). And
this adaptation is proving successful. In particular, we are seeing the emergence of
new cybercrime operating models among high-profile threat groups. Relationships are
forming among “secure syndicates” that closely collaborate and use the same tools—
suggesting a major a change in how threat actors work together in the underground
economy, which will make attribution even more difficult.
The Accenture Security iDefense Threat Intelligence Services team has observed a
distinct and dangerous shift in threat actor TTPs during the past 12 months. Threat
actors are pivoting their operations strategically, operationally and tactically—and in
doing so they are testing the resilience of organizations who are doing their best to
keep up. Let’s take a look at these changes in more detail.
To take full advantage of the world stage, threat actors are paying
even closer attention to important global events and are using them as
distractions or lures to breach target networks. Accenture iDefense has
seen a sharp decline in “true” hacktivism and is instead seeing more
state-sponsored hacktivism with goals to disrupt events and influence a
wide range of activities in the sponsoring nation’s favor. Nation-states are
increasingly outsourcing malicious cyberoperations to cybercriminals
to increase their capabilities and attain strategic goals—blurring lines
between politically and financially motivated cyberthreat activities.
1 What’s the cyber future for Financial Services? April 26, 2019. Accenture.
https://www.accenture.com/us-en/blogs/blogs-cyber-future-financial-services.
The majority of hackers still rely on human error as the main way to breach
networks; however, with increased awareness of domain-squatting and
phishing, the returns for such attack methods has decreased. Even so,
some tried and tested methods are far from being abandoned. Threat
actors continue to use “living off the land” tools and non-malicious
software, such as Remote Desktop Protocol (RDP) and PowerShell, in
malicious ways to attempt to avoid detection. 2
2 Security Response. “What is Living off the Land?” October 3, 2018. Symantec.
https://medium.com/threat-intel/what-is-living-off-the-land-ca0c2e932931.
WHAT’S INSIDE?
The 2018 Cyber Threatscape report noted the clear need for more effective
use of actionable threat intelligence. With state-sponsored activities a
growing force to be reckoned with, extended supply chain threats, targets
against critical infrastructure and a surge in miner malware and more
financially motivated advanced persistent threats, CISOs have had their
work cut out to budget and act effectively.
The 2019 Cyber Threatscape report has discovered five factors that are
influencing the cyberthreat landscape:
1
COMPROMISING GEOPOLITICS: NEW
THREATS EMERGE FROM DISINFORMATION
AND TECHNOLOGY EVOLUTION
OVERVIEW
3 Suggested reading: “Worldwide Threat Assessment of the US Intelligence Community.” January 29,
2019. DNI. https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR---SSCI.pdf; “Best Practices
for Securing Election Systems.” May 21, 2019. US-CERT. https://www.us-cert.gov/ncas/tips/ST19-
002; “Progress Made, But Additional Efforts Are Needed to Secure the Election Infrastructure.”
February 28, 2019. DHS OIG. https://www.oig.dhs.gov/sites/default/files/assets/2019-03/OIG-19-24-
Feb19.pdf; “Election Cybersecurity: Challenges and Opportunities.” February 2019. ENISA. https://
www.enisa.europa.eu/publications/enisa-position-papers-and-opinions/election-cybersecurity-
challenges-and-opportunities; “Elections under threat: securing democracy in cyberspace.”
February 26, 2019. Microsoft. https://blogs.microsoft.com/eupolicy/2019/02/26/securing-
democracy-in-cyberspace/; “An update on our work to prevent abuse ahead of the EU elections.”
January 29, 2019. Google. https://www.blog.google/around-the-globe/google-europe/update-our-
work-prevent-abuse-ahead-eu-elections/; “Homeland Security Chief Cites Top Threat to U.S. (It’s
Not the Border).” March 18, 2019. The New York Times. https://www.nytimes.com/2019/03/18/us/
politics/homeland-security-cyberthreats.html.
attractive redhead. They soon concluded that “Katie Jones” did not exist;
the photo had been created using generative adversarial networks, or
GANs, a form of artificial intelligence. Whoever created it was apparently
attempting to gain the trust of Keir Giles, and likely to spy on him. 4
4 Satter, Raphael. “Experts: Spy used AI-generated face to connect with targets.” June 13, 2019. AP
News. https://www.apnews.com/bc2f19097a4c4fffaa00de6770b8a60d.
5 Lin, Herb. Cyber-Enabled Information Operations Through the Lens of Cyberwar.
Cybersecurity and Privacy (CySeP) Technical Program. June 11, 2019, Stockholm, Sweden.
https://cysep.conf.kth.se/agenda.html.
McCain, John. “NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2019-CONFERENCE
REPORT” July, 2018. https://www.acq.osd.mil/dpap/dars/docs/FY19_NDAA_Conf_Bill.pdf.
6 iDefense Security Intelligence Services. “Outcast Russia Eyes 2019.” February 1, 2019.
IntelGraph reporting.
7 Mueller, Robert. “Report on the Investigation into Russian Interference in the 2016 Presidential
Election.” March 22, 2019. US Department of Justice. https://www.justice.gov/storage/report.pdf.
DISINFORMATION TRADECRAFT
8 Theohary, Catherine. “Defense Primer: Information Operations.” Updated December 18, 2018.
Congressional Research Service. https://crsreports.congress.gov/product/pdf/IF/IF10771.
9 Weedon, Jen et al. “Information Operations and Facebook.” April 27, 2017.
https://fbnewsroomus.files.wordpress.com/2017/04/facebook-and-information-operations-v1.pdf.
10 Theohary, Catherine. “Defense Primer: Information Operations.” Updated December 18, 2018.
Congressional Research Service. https://crsreports.congress.gov/product/pdf/IF/IF10771.
Those who carry out disinformation and other IO can do so via “white”
methods (broadcasting one’s message openly through state media),
“grey” methods (placing information in other sympathetic media), and
“black” methods (using hackers, trolls, and honeypots). 11 They seek to
target various audiences. For a non-state actor such as a criminal group
or gang, the audiences could include one’s own group members or a rival
group, law enforcement, politicians, or the general public. For a state,
audiences could include one’s own population; the adversary country’s
politicians, bureaucrats or soldiers; various groups within the adversary
country’s population; or world opinion as a whole. Aimed at one’s own
group or population, information operations could seek to reassure, shape
opinion, or scare the population into rallying around a particular purpose.
When targeting politicians or decisionmakers, IO could persuade, scare,
or lure them into making decisions favorable to the group undertaking
the operations. When aimed at an adversary group’s military or general
population, IO may erode its desire to resist, win its support, or gain
leverage by crafting alternate narratives or sowing divisions.
13 Jackson, Dean. “Issue Brief: Distinguishing Disinformation from Propaganda, Misinformation, and
“Fake News.” October 17, 2017. National Endowment for Democracy. https://www.ned.org/issue-
brief-distinguishing-disinformation-from-propaganda-misinformation-and-fake-news.
14 iDefense Security Intelligence Services. “Outcast Russia Eyes 2019.” February 1, 2019.
https://intelgraph.idefense.com/#/node/intelligence_alert/view/df6d1797-79c5-42fd-9792-
d5abbbe4467e; iDefense Security Intelligence Services. “GRU Unmasking Opens New Phase of
CyberCold War.” November 17, 2018. IntelGraph reporting.
15 Weedon, Jen et al. “Information Operations and Facebook.” April 27, 2017.
https://fbnewsroomus.files.wordpress.com/2017/04/facebook-and-information-operations-v1.pdf.
16 Rid, Thomas. March 29, 2018. Twitter. https://twitter.com/RidT/status/979420795024871424.
17 Joyner, Chris. “‘Pro-white’ rally at Stone Mountain collapses amid internal strife.” January 31, 2019.
Atlanta Journal-Constitution. https://www.ajc.com/news/breaking-news/pro-white-rally-stone-
mountain-collapses-amid-internal-strife/gvReqHeqcXNqFytV9xm1jK/.
18 Rezaian, Jason. Why does the U.S. need trolls to make its Iran case? June 11, 2019. The Washington
Post. https://www.washingtonpost.com/opinions/2019/06/11/why-does-us-need-trolls-make-its-iran-
case/.
19 “Summary: Department of Defense CyberStrategy.” September 18, 2018. US Department of Defense.
https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.
PDF; Kerr, Jaclyn and Herbert Lin. “On Cyber-Enabled Information Warfare and Information
Operations.” forthcoming, Oxford Handbook of Cybersecurity, 2019. May 2019. Oxford University
Press. https://ssrn.com/abstract=3015680.
20 “Statement of Chris Inglis before the Senate Armed Services Committee.” April 27, 2017.
https://www.armed-services.senate.gov/hearings/17-04-27-cyber-enabled-information-operations.
21 “The Interview: A guide to the cyber attack on Hollywood”. 29 December 2014. BBC News.
https://www.bbc.co.uk/news/entertainment-arts-30512032.
22 Theohary, Catherine. “Defense Primer: Information Operations.” Updated December 18, 2018.
Congressional Research Service. https://crsreports.congress.gov/product/pdf/IF/IF10771.
In recent years, the research center Citizen Lab, has detailed the
tradecraft of state-affiliated groups spreading disinformation via social
media. One group, given the name “Endless Mayfly,” is suspected of
conducting both disinformation and malware campaigns. Endless
Mayfly used typo-squatted domains to impersonate global news outlets,
“replacing letters with look-alike characters to create visually identical
domains.” 24 These sites were promoted on social media platforms as part
23 iDefense Security Intelligence Services. “Cultural and Political Flashpoints Could Drive
Cyberoperations in Entertainment Industry.” March 14, 2019. IntelGraph reporting.
24 Lim, Gabrielle, et. al. “Burned After Reading: Endless Mayfly’s Ephemeral Disinformation Campaign.”
May 14, 2019. The Citizen Lab. https://citizenlab.ca/2019/05/burned-after-reading-endless-mayflys-
ephemeral-disinformation-campaign/#fn1.
25 Fan, Rui, et. al. “Social media bots and stock markets.” Updated November 2018. Swansea University.
https://www.researchgate.net/publication/331639758_Social_media_bots_and_stock_markets.
26 Mathews, Lee. “SEC Charges Hackers Who Broke Into EDGAR Database And Traded On Stolen
Secrets.” January 15, 2019. https://www.forbes.com/sites/leemathews/2019/01/15/sec-charges-
hackers-who-broke-into-edgar-database-and-traded-on-stolen-secrets/#6aea981e5979.
27 Accenture Security. “Future cyberthreats: Extreme but plausible threat scenarios in Financial
Services.” May 2019. https://www.accenture.com/_acnmedia/PDF-100/Accenture_FS_Threat-Report_
Approved.pdf#zoom=50.
28 Gyenes, Nat, et. al. “How Misinfodemics Spread Disease.” August 30, 2018. The Atlantic. https://
www.theatlantic.com/technology/archive/2018/08/how-misinfodemics-spread-disease/568921/.
29 lgaier, Joachim, et. al. “The communication aspects of the Ebola virus disease outbreak in Western
Africa – do we need to counter one, two, or many epidemics?” October 2015. Croatian Medical
Journal. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4655935/.
Social media has also been used to spread weaponized lures directly.
Amplification of politicized narratives which elevate topics of interest
to targeted users sets the stage for the success of these lures, as in the
WINTERFLOUNDER example described on page 36. This is one of a
number of ways cyberthreat actors can leverage disinformation during
their campaigns.
In the report “Know Your Threat: AI Is the New Attack Surface,” 31 Accenture
Labs explains this phenomenon and other avenues of adversary
opportunity opened up by increasingly complex machine-learning models,
especially image content and classification, natural language processing
and industrial control systems (ICS). As they focus more on interference
with AI modeling, threat actors and groups are likely to deploy adversarial
AI, corrupting the ability of machine learning algorithms to interpret system
inputs and exercising control over their behavior. To do this, attackers may
create adversarial examples to break the model’s performance, using deep
learning models known as Generative Adversarial Networks. Researchers
have demonstrated proof-of-concept (PoC) attacks against malware
detection and optical character recognition. Adversarial AI using deep-
learning applications in natural-language processing could enable the
manipulation of algorithms that determine sentiment, gather intelligence,
or filter for spam and phishing.
31 “Know Your Threat: AI is the New Attack Surface,” Accenture, 2019. https://www.accenture.com/_
acnmedia/Accenture/Redesign-Assets/DotCom/Documents/Global/1/Accenture-Trustworthy-AI-
POV-Updated.pdf.
32 “AI and Machine Learning Exploit, Deepfakes, Now Harder to Detect.” PCMAG, May 13, 2019. https://
www.pcmag.com/article/367357/ai-and-machine-learning-exploit-deepfakes-now-harder-to-detect.
33 “Browser Plug-ins that Spot Fake News Show the Difficulty of Tackling the ‘Information Apocalyse.’”
The Verge, August 23, 2018. https://www.theverge.com/2018/8/23/17383912/fake-news-browser-
plug-ins-ai-information-apocalypse.
HACKTIVISM MASKS
36 iDefense Security Intelligence Services. “iDefense Explains: How GDPR Could Influence Cyber-
criminal Extortion and Data-for-Ransom Attack.” May 4, 2018. IntelGraph reporting.
37 iDefense Security Intelligence Services. “State-Sponsored Hacktivism: Attributing CyberInformation
Operations Using Hacktivist Personas.” May 2, 2018. IntelGraph reporting.
38 iDefense Security Intelligence Services. “Anonymous Yet Familiar: The Use of False Personas by
Russian Cyberinformation Operations.” November 27, 2018. IntelGraph reporting.
39 Integrity Initiative. “Statement on Russian media publication of hacked II documents.” November 26,
2018. https://web.archive.org/web/20181219044330/https://www.integrityinitiative.net/.
40 iDefense Security Intelligence Services. “Account Anonymous Posts to CyberGuerrilla Fifth
Disclosure of Internal Documents from Integrity Initiative.” January 25, 2019. IntelGraph reporting;
Anonymous. “The nAbAt a ICC soApboX ‘Operation Integrity Initiative.’” British informational war
against all. Part 5.” January 24, 2019 (Screenshot taken June 5, 2019). CyberGuerrilla. https://www.
cyberguerrilla.org/blog/operation-integrity-initiative-british-informational-war-against-all-part-5/.
41 Burt, Tom. “New steps to protect Europe from continued cyberthreats.” February 20, 2019.
Microsoft. http://web.archive.org/web/20190220083910/https://blogs.microsoft.com/
eupolicy/2019/02/20/accountguard-expands-to-europe/.
42 “The nAbAt a ICC soApboX ‘Operation ‘Integrity Initiative.’” British informational war against all. Part
5.” January 24, 2019 (Screenshot taken June 5, 2019). CyberGuerrilla. https://www.cyberguerrilla.
org/blog/operation-integrity-initiative-british-informational-war-against-all-part-5/.
43 Dalek, Jakub et al. “Information Controls during Military Operations.” October 21, 2015. The Citizen
Lab. https://citizenlab.ca/2015/10/information-controls-military-operations-yemen/.
further disruptive attacks. The exact identity of the re-emerged YCA persona
has not been disclosed or otherwise identified. 44
Finally, threat actors may make deliberate attempts to discredit the very
investigators who are uncovering disinformation, as in the case of the
Integrity Initiative, described above.
44 iDefense Security Intelligence Services. “Yemen CyberArmy Returns with Defacements Referencing
Shamoon Wiper Attacks.” January 9, 2019. IntelGraph reporting.
45 “Countries and Regions: Baltic States.” Accessed June 19, 2019. EU Versus Disinformation.
https://euvsdisinfo.eu/reading-list/countries/ ; Prague Manual. April 30, 2018. https://www.
europeanvalues.net/wp-content/uploads/2018/07/Prague-Manual.pdf.
46 Jurecic, Quinta. “Where in the World Is Elena Khusyaynova?” October 26, 2018. Lawfare.
https://www.lawfareblog.com/where-world-elena-khusyaynova.
October 2019 Brexit dead- Profiting from Brexit panic, SNAKEMACKEREL has delivered
line malware using Brexit-themed lure documents. Since before
the 2016 Brexit referendum, hacktivists have sought to sow
confusion and panic around the Brexit issue. 47
47 Yip, Michael. “Snakemackerel delivers Zekapab malware.” November 29, 2018. Accenture.
https://www.accenture.com/us-en/blogs/blogs-snakemackerel-delivers-zekapab-malware;
iDefense Security Intelligence Services. “Profiting from Panic: Brexit and Potential Russian
Threat Activity Affecting Financial Institutions.” March 8, 2019. IntelGraph reporting.
48 iDefense Security Intelligence Services. “Aggressive Defensiveness: Russian Information
Operations against the US Political System.” January 7, 2017. IntelGraph reporting; iDefense
Security Intelligence Services. “Anonymous Yet Familiar: The Use of False Personas by Russian
Cyberinformation Operations.” November 27, 2018. IntelGraph reporting; iDefense Security
Intelligence Services. “US Indictment Casts Light on Russian Strategies in 2016 US Election and
Future Threats.” July 18, 2018. IntelGraph reporting; iDefense Security Intelligence Services. “Iron
Friends: China Hacking Cambodia 2018 Election Entities.” July 19, 2018. IntelGraph reporting.
FIGURE 2 Key events of 2019 and 2020 that may attract cyberthreat activity (cont’d.)
August 2020 2020 Tokyo Threat actors have carried out hacktivism campaigns against
Summer the World Anti-Doping Agency (WADA), and the cyberthreat
Olympics group behind Olympic Destroyer malware conducted
significant operations against the 2018 PyeongChang
Winter Olympics. 49
November G20 Summit G20 Summit meetings are popular targets for hacktivist
21–22, 2020 meetings campaigns, including those that conduct denial-of-service
attacks, and have also attracted the use of regionally specific
techniques, such as the exploitation of vulnerabilities in
Korean-language Hangul word processor tools. Threat
groups have also used the G20 summit as a lure for phishing
campaigns targeting organizations unrelated to the meeting. 50
September UN General The UN is a frequent hacktivist and cyberespionage target,
15–30, 2020 Assembly especially when hosting large member events such as General
75th Session Assembly gatherings. 51
Unscheduled Global Global military conferences in general are likely to be preferred
defense and targets of state-sponsored cyberespionage activity. Accenture
security iDefense expects SNAKEMACKEREL in particular to target
conferences attendees of defense and security conferences in 2020 such
as the Underwater Defence & Security Conference, using
malicious document attachments and possibly other means. 52
Unscheduled NATO and EU In 2017, SNAKEMACKEREL targeted Montenegro government
enlargement officials prior to Montenegro’s accession to NATO. In
plans December 2018, the same group targeted North Macedonian
officials during that country’s NATO admission. North
Macedonia’s NATO accession is expected to become official
in 2020. 53 Other countries aspiring to join or discussing
NATO membership include Bosnia and Herzegovina, Georgia,
Ukraine, Sweden and Finland. Countries aspiring to join the
European Union include Serbia, Montenegro and Turkey.
Unscheduled Sanctions Threat groups such as SNAKEMACKEREL, Syrian Electronic
declarations Army and Endless Mayfly have responded to sanctions
declarations with campaigns of disinformation and access
attempts against selected government targets. 54
55 iDefense Security Intelligence Services. “In Long Ukrainian Election Season, Russia May Pursue
Strategic Goals without Major Cyberthreat Operations.” April 5, 2019. IntelGraph reporting.
56 “National Police: No cyberattacks on CEC systems recorded during second round of elections.”
April 24, 2019. Ukrinform. https://www.ukrinform.net/rubric-elections/2688206-national-police-no-
cyberattacks-on-cec-systems-recorded-during-second-round-of-elections.html.
57 iDefense Security Intelligence Services. “US-Iran Tensions Mount on JCPOA Withdrawal
Anniversary: Cyberespionage Likely; Cyberattack Dependent on Further Escalation.” May 8, 2019.
IntelGraph reporting.
58 iDefense Security Intelligence Services. “Campaign Targets E-mail Addresses Associated with 2018
PyeongChang Olympics.” January 10, 2018. IntelGraph reporting; iDefense Security Intelligence
Services. “Cyber-threats against 2018 PyeongChang Winter Olympics.” February 7, 2018. IntelGraph
reporting.
59 iDefense Security Intelligence Services. “iDefense Explains: Potential Cyber-threats to 2018 FIFA
World Cup.” May 31, 2018. IntelGraph reporting.
60 “Initial Access.” June 5, 2019. MITRE. https://attack.mitre.org/tactics/TA0001/.
March ”Defence & Security 2018 Conference Entity likely in Used Dealer’s Choice,
2018 Agenda.docx” (Underwater Defence & Montenegro 63 an Adobe Flash exploit
Security conference) platform
66 Reichel, Dominik and Anthony Kasza. “The Gamaredon Group Toolset Evolution.” February 27, 2017.
Palo Alto Networks. https://unit42.paloaltonetworks.com/unit-42-title-gamaredon-group-toolset-
evolution/.
67 iDefense Security Intelligence Services. “WINTERFLOUNDER Campaign Lure Pegged to Ukrainian
Election Scandal.” April 30, 2019. IntelGraph reporting.
The Ukrainian blackouts of 2015 and 2016 and the devastating Petya.A
(NotPetya) attack of June 2017 showed the power of destructive and
disruptive malware. 69 Several countries’ intelligence services reported
that cyberthreat actors from adversary countries have pre-positioned
backdoors throughout large parts of the global financial, physical and
Internet infrastructure, with these backdoors potentially capable of being
triggered in a destructive or disruptive attack. A January 2019 assessment
SUMMARY
70 “DNI COATS OPENING STATEMENT ON THE 2019 WORLDWIDE THREAT ASSESSMENT OF THE U.S.
INTELLIGENCE COMMUNITY.” January 29, 2019. US Office of the Director of National Intelligence.
https://www.dni.gov/index.php/newsroom/congressional-testimonies/item/1949-dni-coats-
opening-statement-on-the-2019-worldwide-threat-assessment-of-the-us-intelligence-community.
OVERVIEW
71 Greenberg, Andy. “Feds Take Down A Half-Billion Dollar Cybercrime Forum After 7 Years Online.”
February 7, 2018. Wired. https://www.wired.com/story/infraud-feds-takedown-cybercrime/;
Burgess, Matt. “Inside the takedown of the alleged €1bn cyber bank robber.” April 4, 2018. Wired
UK. https://www.wired.co.uk/article/carbanak-gang-malware-arrest-cybercrime-bank-robbery-
statistics. US Department of Justice. “Two International Cybercriminal Rings Dismantled and Eight
Defendants Indicted for Causing Tens of Millions of Dollars in Losses in Digital Advertising Fraud.”
November 27, 2018. https://www.justice.gov/usao-edny/pr/two-international-cybercriminal-rings-
dismantled-and-eight-defendants-indicted-causing.
72 Nir, Sivan. “Threadkit, Formbook Exploit Old Microsoft Vulnerability.” February 6, 2019. Skybox
Security. https://blog.skyboxsecurity.com/formbook-threadkit/.
73 Segura, Jérôme. “Exploit kits: winter 2019 review.” January 18, 2019. Malwarebytes.
https://blog.malwarebytes.com/threat-analysis/2019/02/exploit-kits-winter-2019-review/.
74 Ibid.
75 “AlphaBay Takedown.” July 20, 2017. FBI. https://www.fbi.gov/news/stories/alphabay-takedown.
76 Sheridan, Kelly. “Dark Web Marketplaces Dissolve Post-AlphaBay, Hansa Takedown.” June 5, 2019.
Dark Reading. https://www.darkreading.com/threat-intelligence/dark-web-marketplaces-dissolve-
post-alphabay-hansa-takedown/d/d-id/1331971.
77 Greenberg, Andy. “Feds Dismantled the Dark-Web Drug Trade—but It’s Already Rebuilding.” May 9,
2019. Wired. https://www.wired.com/story/dark-web-drug-takedowns-deepdotweb-rebound/.
78 iDefense Security Intelligence Services. “The Other Booming Industry: Characteristics and Global
Effect of the Chinese Online Underground Economy.” July 14, 2018. IntelGraph reporting.
79 iDefense Security Intelligence Services. “Cat and Mouse Game: China’s Cryptocurrency Regulations
and Cryptocurrency Cybercrime.” December 5, 2018. IntelGraph reporting.
80 Barret, Brian. “Hack Brief: Hackers Stole $40 Million From Binance Cryptocurrency Exchange.” May
8, 2019. Wired. https://www.wired.com/story/hack-binance-cryptocurrency-exchange/.
81 “What is black about ‘black technology’?” (“ ” ?”). May 30, 2018. Xinhua Net.
http://www.xinhuanet.com/politics/2018-05/30/c_1122909806.htm.
82 “ - ” (“Digital Finance Anti-fraud – Observation and Strategy”). November 2018.
Tecent Financial Security & China Academy of Information and Communication Technology
(CAICT). http://www.caict.ac.cn/kxyj/qwfb/bps/201811/P020181127615657923423.pdf.
83 Ibid.
FIN7
FIN7 84 is an advanced cybercriminal group that specializes in targeted
attacks against organizations in the retail, hospitality and financial services
sectors. FIN7 is highly organized and vertically structured, operating
under the front of a legitimate penetration testing company named
Combi Security. FIN7 typically conducts spear-phishing attacks using
malicious document attachments against selected individuals in targeted
organizations. Malware delivered in these attacks has included the
Carbanak implant and bespoke script-based implants such as HALFBAKED,
Bateleur and DNSMessenger. In addition, FIN7 has used a wide range of
penetration testing tools such as Meterpreter, Cobalt Strike and Mimikatz
for initial access and post-exploitation activities. Other bespoke malware
that Accenture iDefense analysts have observed include 7Logger, Vampire
84 iDefense Security Intelligence Services. “FIN7.” January 16, 2019. IntelGraph reporting.
Cobalt Group
Cobalt Group 87 is an advanced financially motivated threat group that
has been active since as early as mid–2016. Accenture iDefense analysts
have observed several of the group’s distinctive TTPs, including the
preference and ability to create new first-stage malware families and
the reuse of specific mail servers in multiple campaigns. The group also
exhibits a preference for using Cobalt Strike as a main payload to establish
access to compromised machines and entrench on target networks.
Contract Crew
Contract Crew 88 is a financially motivated threat group that targets financial
institutions with a focus on automated teller machines (ATMs) in the CIS
region since at least 2016. As of late 2018 and early 2019, Contract Crew
has reportedly expanded its targeting beyond Russia and Commonwealth
of Independent States (CIS) countries to include European and Middle
Eastern countries. Contract Crew exhibits a strong preference for using
spear-phishing e-mails to deliver malicious files to intended targets,
with those e-mails subsequently dropping first-stage malware on a
targeted system. The types of malicious files delivered include JavaScript
downloaders, VBScript downloaders disguised as OLE-embedded objects
in DOCX documents, documents weaponized with CVE-2015-2545 or CVE-
2017-0199 exploits, CHM files embedded in DOC files, RAR or ZIP archives
88 iDefense Security Intelligence Services. “Contract Crew.” April 4, 2019. IntelGraph reporting.
containing additional nested file types, and Windows Shortcut file (.lnk)
downloaders. Exploitation via any of these methods would then trigger
the download and execution of the Silence Downloader, which would
subsequently download the Silence backdoor’s main module. The group
also has custom proxy toolsets that can be deployed to enable access
to harder-to-reach networks, such as those inside financial institutions.
Contract Crew uses multiple stages of execution to include the use of
legitimate system utilities to increase obfuscation and dwell time. Activities
from Contract Crew have been observed to continue well into 2019.
Over the course of the last two to three years, Accenture iDefense has
observed a marked increase in the sale of remote access to compromised
networks on underground forums and marketplaces, as well as an increase
in the number of incidents in which financially motivated threat actors
employ commodity malware to conduct intrusions for financial gain.
Actors can use network access to carry out an array of malicious activities,
including malware distribution, theft of PII, exfiltration of payment card
data and more, although how to use a network where an actor has
purchased access is ultimately up to that buyer. Since the beginning of
2019, Accenture iDefense has observed several high-profile threat groups
engaged in the buying and selling of network access in the underground.
Such examples include “Nikolay,” a group specializing in the sale of
access to numerous corporate networks, and “GandCrab,” an enterprise
distributing ransomware through an affiliate program it operates.
Since March 2018, the group using the alias GandCrab on a popular
Russian-language underground forum has distributed ransomware of the
same name through an affiliate program model advertised on that forum.
This model involves the group recruiting partners that are paid to distribute
the ransomware through means such as spam, exploit kits and targeted
attacks. Upon successful distribution, affiliates will receive 60 percent
to 80 percent of all ransom payments, while GandCrab will pocket the
remaining 20 percent to 40 percent. 89
SUMMARY
3
HYBRID MOTIVES POSE NEW
DANGERS IN RANSOMWARE
DEFENSE AND RESPONSE
OVERVIEW
92 iDefense Security Intelligence Services. “Overview of Recent Ransomware Activity.” March 29, 2019.
IntelGraph reporting.
93 https://www.cbsnews.com/news/ransomware-attack-lake-city-florida-pay-hackers-ransom-
computer-systems-after-riviera-beach/.
94 Sheridan, Kelly. “Valentine’s Emails Laced with Gandcrab Ransomware.” February 14, 2019. Dark
Reading. https://www.darkreading.com/threat-intelligence/valentines-emails-laced-with-gandcrab-
ransomware/d/d-id/1333883.
95 iDefense Security Intelligence Services. “Overview of Recent Ransomware Activity.” March 29, 2019.
IntelGraph reporting.
96 iDefense Security Intelligence Services. “Technical Analysis of MegaCortex.” May 9, 2019.
1
2 Your companies cyber defense systems have been weighed, measured and Have been found wanting.
3 The breach is a result of grave neglect of security protocols.
4 All of your computers have been corrupted with MegaCortex malware that has encrypted your files.
5
6 We ensure that the only way to retrieve your data swiftly and securely is with our software.
7 Restoration of your data requires a private key which only we possess.
8 Don’t waste your time and money purchasing third party software, without the private key they are useless.
9
10 It is critical that you don’t restart or shutdown your computer.
11 This may lead to irreversible damage to your data and you may not be able to turn your computer back on.
12
13 To confirm that our software works email to us 2 files from random computers and C:\lc_vagsi.tsv file (‘s)
14 and you will get them decrypted.
15 C:\lc_vagsi.tsv contain encrypted session keys we need in order to be able to decrypt your files.
16
17 The softwares price will include a guarantee that your company will never be inconvenienced by us.
18 You will also receive a consultation on how to improve your companies cyber security .
19 If you want to purchase our software to restore your data contact us at:
20
21 [email protected]
22 [email protected]
23
24 We can only show you the door. You’re the one who has to walk through it.
25
IntelGraph reporting.
97 ibid.
98 iDefense Security Intelligence Services. “Overview of Recent Ransomware Activity.” March 29, 2019.
IntelGraph reporting.
99 iDefense Security Intelligence Services. “Overview of Recent Ransomware Activity.” March 29, 2019.
IntelGraph reporting
Ransomware
Updateable
Plugin/Executable
Malware Installed
Installed
100 Palmer, Danny. “The Fallout exploit kit is back delivering GandCrab ransomware after a brief hiatus.”
January 18, 2019. ZDnet. https://www.zdnet.com/article/this-malware-spreading-tool-is-back-with-
some-new-tricks/.
101 Kass, DH. “GandCrab Targets MSPs in Criminal Franchise Scheme.” March 12, 2019. MSSP Alert.
https://www.msspalert.com/cybersecurity-breaches-and-attacks/ransomware/gandcrab-targets-
msps/.
102 iDefense Security Intelligence Services. “Technical Analysis of MegaCortex.” May 9, 2019.
IntelGraph reporting.
103 Staff. “Beazley Breach Briefing – 2019.” March 21, 2019. Beazley.
https://www.beazley.com/news/2019/beazley_breach_briefing_2019.html.
104 iDefense Security Intelligence Services. “Identifying Malware Families: Ovidiy Stealer, LiteHTTP Bot
and AsuraHTTP Ransomware.” May 10, 2019. IntelGraph reporting.
• Hacktivism
• Financial gain
• Geopolitical messaging
Hacktivism
Ransomware may actualize apparent hacktivist campaigns such as the
JCry ransomware deployed as part of OpJerusalem (see Figure 10) in which
the motive behind the attack is to use the usual ransom note is used to
convey an ideological agenda and/or disrupt the business operations of the
targeted organizations.
Figure 10. Political message from JCry malware observed as part of OpJerusalem
Financial gain
In addition to targeting by specific countries, threat actors may search
for organizations that have the fiscal resources necessary to pay a large
ransom. Threat actors can find opportunistic elements to exploit, such as
RDP systems with weak or already-compromised credentials that can serve
as a access points for a site-wide ransomware campaign. 105 As an example,
the Goga ransomware (see Figure 11), which hit numerous companies in the
engineering, chemicals, and metals industries, is a targeted threat that may
have been deployed via opportunistic means.
Figure 11. Goga ransom note 106
1 Greetings!
2
3 There was a significant flaw in the security system of your company.
4 You should be thankful that the flaw was exploited by serious people and not some rookies.
5 They would have damaged all of your data by mistake or for fun.
6
7 Your files are encrypted with the strongest military algorithms RSA4096 and AES-256.
8 Without our special decoder it is impossible to restore the data.
9 Attempts to restore your data with third party software as Photorec, RannohDecryptor etc.
10 will lead to irreversible destruction of your data.
11
12 To confirm our honest intentions.
13 Send us 2-3 different random files and you will get them decrypted.
14 It can be from different computers on your network to be sure that our decoder decrypts everything.
15 Sample files we unlock for free (files should not be related to any kind of backups).
16
17 We exclusively have decryption software for your situation
18
19 DO NOT RESET OR SHUTDOWN - files may be damaged.
20 DO NOT RENAME the encrypted files.
21 DO NOT MOVE the encrypted files.
22 This may lead to the impossibility of recovery of the certain files.
23
24 The payment has to be made in Bitcoins.
25 The final price depends on how fast you contact us.
26 As soon as we receive the payment you will get the decryption tool and
27 instructions on how to improve your systems security
28
29 To get information on the price of the decoder contact us at:
30 [email protected]
31 [email protected]
32
With the focus on larger and more substantial targets, threat actors can
maintain their motive of realizing a higher ROI, 108 which, in turn, attracts
actors with more resources and skills to such campaigns. Accenture
iDefense assesses that more experienced threat actors typically practice
better tradecraft and operational security, which leads to longer-running
campaigns that are less subject to law enforcement disruption. Other
successful campaign activity may include affiliate programs.
107 iDefense Security Intelligence Services.” Threat Group “Nikolay” Advertises Access to Multiple
Companies for Ransomware Attacks.” March 21, 2019. IntelGraph reporting.
108 iDefense Security Intelligence Services. “Overview of Recent Ransomware Activity.”
March 29, 2019. IntelGraph reporting.
109 iDefense Security Intelligence Services. “Account BulletToothTony Advertises Snatch Ransomware
Affiliate Program.” March 21, 2019. IntelGraph reporting.
110 iDefense Security Intelligence Services.” Account jsworm Advertises JSWORM Ransomware Affiliate
Program.” May 6, 2019. IntelGraph reporting.
The motives behind a ransomware attack can also be political. The Petya
malware outbreak of June 27, 2017, appears to have been a geopolitical attack
aimed at paralyzing government and business in Ukraine (see Figure 12). 113 It
targeted that country by infecting an update of a software application that
is widely used for tax filings and other official functions there, but it also
crippled other companies that do business in Ukraine. In the future, politically
motivated ransomware attacks that target a country could again be spread by
infecting or replacing software that is widely used in a target country, such as
tax or other government software unique to that country.
111 iDefense Security Intelligence Services. “iDefense Explains: The Coverup (One Use for Destructive
Malware).” July 31, 2018. IntelGraph reporting.
112 Biasini, Nick. “Ransomware or Wiper? LockerGoga Straddles the Line.” March 20, 2019. Talos
Intelligence. https://blog.talosintelligence.com/2019/03/lockergoga.html.
113 Greenberg, Andy. “The Untold Story of NotPetya, the Most Devastating Cyberattack in History.”
August 22, 2018. Wired. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-
crashed-the-world/
Geopolitical messaging
Even a single ransomware campaign can serve a mix of financial and political
purposes. For example, GandCrab, a criminal ransomware group, expressly
refrains from targeting people in certain countries. Many cybercriminals
refrain from targeting their co-nationals to avoid criminal prosecution and
the group’s targeting behavior could be motivated by their being located in
the same country as their targets. In October 2018, GandCrab also vowed
to provide decryption keys to people in war-torn Syria as a humanitarian
gesture; however, it declared it would never release keys to victims in other
countries, as “we need to continue punitive proceedings against certain
countries.” 115 Accenture iDefense observed that GandCrab’s targeting in
October included entities in Germany, Switzerland and the Netherlands—
countries that had actively investigated and denounced chemical attacks
by the Syrian government against civilians. 116 Other possible motives for
114 iDefense Security Intelligence Services. “Global Ransomware Outbreak Cripples Major Companies
Worldwide.” March 1, 2018. IntelGraph reporting.
115 iDefense Security Intelligence Services. “Account GandCrab Burnishes Patriotic Credentials by
Showing Sympathy for Syria.” November 6, 2018. IntelGraph reporting.
116 ibid.
117 iDefense Security Intelligence Services. “Overview of Recent Ransomware Activity.” March 29, 2019.
IntelGraph reporting.
118 Seres, Debbie. “Cybersecurity threats: How to discover, remediate, and mitigate.” August 13, 2018.
Microsoft. https://www.microsoft.com/security/blog/2018/08/13/cybersecurity-threats-how-to-
discover-remediate-and-mitigate/.
119 Staff. “DCShadow.” Accessed on March 25, 2018. MITRE.
https://attack.mitre.org/techniques/T1207/.
120 Staff. “Remote Desktop Protocol.” Accessed on March 25, 2018. MITRE.
https://attack.mitre.org/techniques/T1076/.
–– Search mail server logs to see if any user within the corporation has
received the same or similar e-mails by looking at e-mail subjects,
e-mail true senders, e-mail X-mailer headers, e-mail sender IP
addresses, file attachment names or hashes.
–– Quarantine attachments.
–– Disable the execution of any files that carry the name “perfc.dat” as
well as the PSExec utility from the Sysinternals Suite.
4
IMPROVED ECOSYSTEM HYGIENE IS
PUSHING THREATS TO THE SUPPLY CHAIN,
TURNING FRIENDS INTO FRENEMIES
OVERVIEW
121 Krebs, Brian. “Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware
Attack.” January 2, 2019. Krebs on Security. https://krebsonsecurity.com/2019/01/cloud-hosting-
provider-dataresolution-net-battling-christmas-eve-ransomware-attack/.
122 Nicholas, Shaun. Late with your financial paperwork? Here’s a handy excuse: Malware smacked your
bean-counter cloud offline. May 8, 2019. The Register. https://www.theregister.co.uk/2019/05/08/
cch_hit_by_malware/.
123 Accenture Strategy. “Chief supply chain officers: Do you know where your weakest link is?” 2016.
https://www.accenture.com/t00010101t000000__w__/it-it/_acnmedia/pdf-27/accenture-strategy-
supply-chain-video-transcript.pdf; Cimpanu, Catalin. “Cloud-based virtual desktop provider hit by
ransomware.” July 22, 2019. ZDNet. https://www.zdnet.com/article/cloud-based-virtual-desktop-
provider-hit-by-ransomware/.
BACKGROUND
124 Gronager, John, et. al. “Deliver Uncompromised: A Strategy for Supply Chain Security and
Resilience in Response to the Changing Character of War.” August 2018. MITRE. https://www.mitre.
org/sites/default/files/publications/pr-18-2417-deliver-uncompromised-MITRE-study-8AUG2018.pdf.
127 iDefense Security Intelligence Services. “Analysis of NetSarang SHADOWPAD Supply-Chain Attack.”
August 21, 2017. IntelGraph reporting.
128 iDefense Security Intelligence Services. “Who Will Deliver the Next Petya.A? Third-Party Software
and Services Could Paralyze Entire Sectors or Countries.” July 6, 2018. IntelGraph reporting.
129 “Greenberg, Andy. “A Mysterious Hacker Group is on a Supply Chain Hijacking Spree.” May 3, 2019.
Wired. https://www.wired.com/story/barium-supply-chain-hackers/.
130 iDefense Security Intelligence Services. “PIGFISH Actors Continue Supply Chain Attacks in
Southeast Asia.” March 12, 2019. IntelGraph reporting.
131 “Code Signing.” June 5, 2019. MITRE. https://attack.mitre.org/techniques/T1116/.
132 iDefense Security Intelligence Services. “Black Ghost Knifefish.” July 7, 2017. IntelGraph reporting.
133 iDefense Security Intelligence Services. “Newly Observed Heriplor Sample Linked to BLACK GHOST
KNIFEFISH Actors.” May 8, 2019. IntelGraph reporting.
134 iDefense Security Intelligence Services. “Analysis of Energy-Sector Targeting through SMB
Techniques.” July 3, 2017. IntelGraph reporting.
135 iDefense Security Intelligence Services. “Analysis of Alert TA18-074A Indicators.” March 16, 2018.
IntelGraph reporting.
136 “Cyber Threatscape Report 2018: Midyear Cybersecurity Risk Review.” 2018. Accenture Security.
https://www.accenture.com/_acnmedia/PDF-83/Accenture-Cyber-Threatscape-Report-2018.pdf.
Aside from a small market for products and services relating to ATM
manufacturing and maintenance, Accenture iDefense has observed few
137 iDefense Security Intelligence Services. “ Examining ATT&CK Techniques: Threat Actors’ Use of
Supply Chain Compromise.” March 3, 2019. IntelGraph reporting.
138 iDefense Security Intelligence Services. “<Redacted> Cyber-security Company <Redacted> Exposes
Critical Infrastructure Sectors in Europe and North America to Risks of Cyber-crime and Espionage.”
June 13, 2018. IntelGraph reporting.
139 ibid.
140 ibid.
141 Ellyatt, Holly. “The effect of geopolitics on global growth worries me most, WEF president says.”
January 21, 2019. CNBC.
https://www.cnbc.com/2019/01/21/the-effect-of-geopolitics-on-global-growth-worries-me-most-
wef-president-says.html.
risks associated with the other party. If one of the entities is unknowingly
a victim of a previous compromise, once merged, the adversary could
potentially inherit a new victim as well. There are several critical moments
during the M&A process when CTI should be at the forefront of any
organization. These moments occur before, during and following any
merger or acquisition.
142 Stubbs, Jack et. al. “Inside the West’s failed fight against China’s ‘Cloud Hopper’ hackers.” June 26,
2019. Reuters. https://www.reuters.com/investigates/special-report/china-cyber-cloudhopper/.
143 Department of Homeland Security Cybersecurity and Infrastructure Security Agency. “Analysis Report
(AR19-133A).” May 13, 2019. US-CERT. https://www.us-cert.gov/ncas/analysis-reports/AR19-133A.
144 ibid.
145 Dahl, Johan. “Factory and Site Acceptance Tests (FAT, SAT) For Electrical and Automation Systems in a
Power Plant.” Accessed on May 13, 2019. Electrical Engineering Portal. https://electrical-engineering-
portal.com/download-center/books-and-guides/power-substations/fat-sat-power-plant.
146 “Joint Advice of the European Supervisory Authorities.” April 10, 2019. European Union. https://eba.
europa.eu/documents/10180/2551996/JC+2019+26+%28Joint+ESAs+Advice+on+ICT+legislative+imp
rovements%29.pdf/4d2ad5e2-1570-48bd-819a-7cd9b4e8b157.
147 “TIBER-EU FRAMEWORK: How to implement the European framework for Threat Intelligence-based
Ethical Red Teaming.” May 2018. European Central Bank. https://www.ecb.europa.eu/pub/pdf/other/
ecb.tiber_eu_framework.en.pdf.
148 Solberg J., S. “File:Global European Union.svg.” Accessed on June 6, 2019. Wikimedia Commons.
https://commons.wikimedia.org/wiki/File:Global_European_Union.svg. Used under Creative
Commons Attribution 3.0 Unported license. iDefense modification of this image to illustrate
adoption of TIBER-EU and associated frameworks does not suggest endorsement by the licensor.
149 “NERC CIP 013-1: CyberSecurity Supply Chain Risk Management.” October 18, 2018. North American
Electric Reliability Corporation. https://www.nerc.com/pa/Stand/Reliability Standards/CIP-013-1.pdf.
SUMMARY
OVERVIEW
150 Columbus, Louis. “83% Of Enterprise Workloads Will Be In The Cloud By 2020.” January 7, 2018.
Forbes. https://www.forbes.com/sites/louiscolumbus/2018/01/07/83-of-enterprise-workloads-will-
be-in-the-cloud-by-2020/.
151 iDefense Security Intelligence Services. “Meltdown and Spectre Multiple Processor Information
Disclosure Vulnerabilities.” January 2, 2018. IntelGraph reporting.
152 iDefense Security Intelligence Services. “Intel Information Disclosure Vulnerabilities - Zombieload,
RIDL and Fallout.” May 15, 2019. IntelGraph reporting.
RISK OVERVIEW
MITIGATIONS
Cloud deployments
Organizations that want to try and minimize the risks associated with the
exploitation of these vulnerabilities should consider using a single-tenant
dedicated host cloud environments. Single-tenant environments provide
a more isolated hardware environment while enabling the flexibility of a
cloud deployment.
153 Amazon. “Introducing new Amazon EC2 instances featuring AMD EPYC processors.” Accessed July
15, 2019. https://aws.amazon.com/ec2/amd/.
154 AMD. “A Great Time to Move to AMD EPYC on Azure.” February 11, 2019. https://community.amd.
com/community/amd-business/blog/2019/02/11/a-great-time-to-move-to-amd-epyc-on-azure.
155 AMD. “AMD and Oracle Collaborate to Provide AMD EPYC™ Processor-Based Offering in the
Cloud.” October 23, 2018. https://www.amd.com/en/press-releases/2018-10-23-amd-and-oracle-
collaborate-to-provide-amd-epyc-processor-based-offering.
Private infrastructure
There are many mitigations available for organizations to remediate the risk
on privately maintained infrastructure. 156 The side-channel vulnerabilities
have resulted in vendors offering mitigations at various levels of the
computing stack—processors, hypervisors, operating systems and software.
Software updates
Most operating system vendors have issued security updates to mitigate
these vulnerabilities. However, in most cases, the resulting compute
performance has been lower. In some instances, the performance
degradation has been reported to be a staggering 30 percent. 157 For example,
for the Portsmash 158 vulnerability, the solution is to disable simultaneous
multithreading (SMT), which can lead to degraded performance. The most
popular software patch is Google’s Retpoline, 159 which prevents the processor
from speculating on the target of an indirect jump.
156 Microsoft Azure. “Guidance for mitigating speculative execution side-channel vulnerabilities in
Azure.” June 3, 2019. https://docs.microsoft.com/en-us/azure/virtual-machines/windows/mitigate-se.
157 Sloss, Benjamin Treynor. “An update on Sunday’s service disruption.” June 3, 2019. Google Cloud.
https://cloud.google.com/blog/topics/inside-google-cloud/an-update-on-sundays-service-
disruption.
158 iDefense Security Intelligence Services. “CVE-2018-5407 - Multiple Vendor Microprocessors Design
Error Information Disclosure Vulnerability.” November 2, 2018. IntelGraph reporting.
159 iDefense Security Intelligence Services. “Meltdown and Spectre Multiple Processor Information
Disclosure Vulnerabilities.” January 2, 2018. IntelGraph reporting.
Compiler vendors have included new compiler flags which add protection
against some vulnerabilities, like Spectre. 160 Newer versions of compilers
default to these flags. To take advantage of these compiler updates,
most software vendors must recompile their applications with updated
compilers. This is not always easy, as some sub-components of large
applications can still be using older libraries which are not compiled with
Spectre mitigations, thereby degrading the overall security posture of the
entire application.
New hardware
The simplest mitigation is to replace the hardware with newer hardware
which has protections built-in to address these vulnerabilities. Although the
cost of replacing hardware prematurely can be expensive, it may be worth
the investment to replace server hardware out of cycle. Updating to new
hardware does not, however, guarantee future security as new classes of
CPU vulnerabilities are found every year.
160 Phabricator. “[Spectre] Introduce a new pass to do speculative load hardening to mitigate Spectre
variant #1 for x86.” March 23, 2018. https://reviews.llvm.org/D44824; Phoronix. “Spectre Mitigation
Added To GCC 8, Seeking Backport To GCC 7.” January 14, 2018. https://www.phoronix.com/scan.
php?page=news_item&px=GCC-8-Spectre-Mitigation-Lands; Microsoft. “Spectre mitigations in
MSVC.” January 15, 2018. https://devblogs.microsoft.com/cppblog/spectre-mitigations-in-msvc/.
However, for organizations that prefer to have complete control over the
compute resources, some amount of risk acceptance can help realize
some of the costs of having an on-premises cloud. With a vastly different
threat model, an organization with an on-premises cloud solution can
choose to not apply the mitigations which may heavily degrade application
performance. A hybrid solution which uses on-premises cloud for sensitive
data and the public cloud for non-sensitive data can also be a solution for
some organizations.
SUMMARY
Today, organizations must not only take on the disruptive forces that
are changing their industries with speed, confidence and continuous
innovation, but also remember their most important currency—trust.
Security is front and center of maintaining that trust, but with new threats
constantly emerging, it is being sorely tested.
In summary:
• Beware of opening more than the back door. The potential for
exploitation of side-channel CPU vulnerabilities so that data can be
read from other hosts on the same physical server appear to make
multi-tenant public cloud services an ideal target. And mitigations
come at a cost—reduced performance that leads to an increase
of compute costs for most enterprises. Designing a risk mitigation
strategy can be vastly different for every organization.
The Cyber Threatscape Report 2019 presents key findings from Accenture
iDefense threat intelligence research into significant cyberthreat trends.
This report covers cyberthreat trends the Accenture iDefense threat
intelligence team has observed and analyzed from January 2019 until July
2019. It provides an overview of the trends and how Accenture iDefense
threat intelligence believes they might evolve and grow throughout the
year ahead.
The following table defines malware, threat groups, exploit kits and
vulnerabilities listed throughout the report.
Carbanak Threat Group Carbanak (also known as Anunak and Teleport Crew) is a 43
sophisticated and persistent cybercrime group that targets
financial institutions, the hospitality industry and credit
card data. It has caused damage of up to US$1 billion from
the financial sector since at least 2013, having carried out
fraudulent banking transactions and ATM compromises.
Cobalt Strike Tool Cobalt Strike is a penetration testing tool that features 43
numerous methods to complicate detection. Both legitimate
security professionals and threat actors use this tool.
Fallout Exploit Kit Fallout is an exploit kit that Accenture iDefense first observed 40
for sale in the underground in September 2018.
GandCrab Threat Group GandCrab is a threat group that has advertised the sale of 48
the GandCrab ransomware affiliate service on the Russian-
language underground forum Exploit.
GrandSoft Exploit Kit GrandSoft is an exploit kit that has been around in some form 40
since 2012. Threat actors used it in 2018 and 2019 to deliver
GandCrab ransomware.
Greenflash Exploit Kit Greenflash Sundown is an exploit kit that targets systems 41
Sundown in Asian countries. It is a private and extensively modified
version of the Sundown exploit kit.
Little Pig Malware Little Pig is a toolkit that generates malicious Microsoft Office 45
macro code used to download additional malware onto a
compromised machine when the macro is executed.
Loki Bot Malware Loki Bot is a resident loader, and password and 40
cryptocurrency wallet stealer. Loki Bot captures passwords
from browsers, as well as e-mail, FTP, SSH and poker clients.
Magnitude Exploit Kit Magnitude is an exploit kit that has been around in 41
some form since 2012. Threat actors most often use
the kit to deliver the Magniber ransomware to targets
in Asian countries.
Petya Malware Petya is a ransomware that overwrites the Master Boot Record 58
to deny victims access to their systems and files. Petya has
various aliases, including EternalPetya, NotPetya, ExPetr,
Pnyetya, SortaPetya and Petna.
Pony Malware Pony (also known as Pony Loader and Fareit) is an information 40
stealer, the main functionality of which includes the ability to
collect and exfiltrate credentials and other information from
an infected host. It also has the ability to act as a downloader
that drops other malware.
RDP Brute Force Attack Type In a Remote Desktop Protocol (RDP) brute force attack, an 50
Attack attacker gains access to a victim’s computer by using brute
force techniques which can effectively crack weak passwords.
Typically, the attacker scans a list of IP ranges for RDP port
3389 (default RDP port) which are open for connection.
RIG Exploit Kit RIG is an exploit kit that has been around since 2014; although 40
its level of activity has declined, it is still periodically seen in
the wild.
Threadkit Exploit Kit Threadkit is an Office document exploit builder kit that supports 41
a variety of recently released exploits, including those for the
CVE-2018-4878, CVE-2018-0802, CVE 2017-11882, CVE-2017-
8759, CVE-2017-8570 and CVE-2017-0199 vulnerabilities.
Underminer Exploit Kit Underminer is an exploit kit that targets Asian countries 41
and is known to deliver a bootkit or a cryptocurrency miner
malware.
Joshua Ray
Managing Director, Accenture Security I [email protected]
Howard Marshall
Associate Director, Accenture Security I [email protected]
Rob Coderre
Senior Manager, Accenture Security I [email protected]
Valentino De Sousa
Security Senior Principal I [email protected]
Emily Cody
Senior Manager, Accenture Security I [email protected]
Jayson Jean
Senior Manager, Accenture Security—iDefense Business
[email protected]
Contributors
Patton Adams, Kiran Bandla, Matthew Brady, Kellie Bryan, Brandon Catalan, Cole
Dunn, Rikki George, Roya Gordon, Christopher Kolling, Deapesh Misra, Rohit
Mothe, Mei Nelson, Nellie Ohr, Meredith Prattico, Bryan Richardson, Nancy Strutt,
Thomas Willkan, Curt Wilson and Michael Yip.