Cymulate’s April 2021 Cyberattacks Wrap-up
Cymulate’s April 2021 Cyberattacks Wrap-up
Threat actors stepped up their game during April 2021, with ransomware groups finding new ways to increase their profits by putting on corporate victims. For instance, the DarkSide ransomware group is openly approaching stock traders to offer them inside knowledge of their latest corporate victims, which would allow the brokers to short sell the breached company’s stock before any data is leaked and the breach becomes public. The Babuk ransomware group also changed its business model, moving from offering ransomware-as-a-service (RaaS) to data theft extortion. The group will still demand ransom for the data stolen from compromised networks before deploying encryption. State-sponsored threat actors were active again. In April, a new malware dubbed PortDoor was used to infiltrate the systems of Rubin Central Design Bureau for Marine Engineering in Saint Petersburg, which is an engineering company that designs submarines for the Russian Navy. The threat actors, suspected to work for the Chinese government, used a spear-phishing campaign that followed a familiar pattern.- The threat actors sent a crafted email to the CEO of the company.
- The email had an attachment with a general description for an autonomous underwater vehicle.
- The attacked RTF file, created with RoyalRoad v7, contained RoyalRoad, a tool for building malicious documents to exploit multiple vulnerabilities in Microsoft’s Equation Editor. RoyalRoad has been linked to Tick, Tonto Team, TA428, Goblin Panda, Rancor, and Naikon that are all threat actors linked to the Chinese government.
- Once the RFT document was opened, it dropped the PortDoor backdoor in the Microsoft Word startup folder, disguising it as the add-in file “winlog.wll.