Between July 17-24, 2024, Blackpoint’s Active Security Operations Center (SOC) responded to 96 total incidents. These incidents included 12 on-premises MDR incidents, 2 Cloud Response for Google Workspace, and 82 Cloud Response for Microsoft 365 incidents, with confirmed or likely threat actor use of:

In this blog, we’ll dive into the details behind these select incidents, including why they’re important for partners to account for today – even if they’ve not been attacked yet! – as well as possible mitigations leveraging your current tech stack and Blackpoint Cyber.

Return to Top

Ratty RAT Incident with Financials Partner on July 17, 2024

Topline Takeaways

  • Industry target: Financials
  • Attacker information:
    • .jar and .zip malicious files
    • Ratty Remote Access Trojan (RAT)
  • Antivirus (AV) and / or EDR present in environment? Yes
  • Threat assessment for partners:
    • The Adversary Pursuit Group (APG) predicts that it is likely that threat actors will continue to deploy Ratty RAT to exploit other Financial organizations over the next 12 months.
  • Recommended remediations and mitigations:
    • Employee security training
    • Regularly audit both environment and endpoints
    • Least-privilege access controls
    • Zero trust network architecture

Ratty RAT Incident Timeline for 2024-07-17

  • Blackpoint’s MDR+R technology alerted to a .jar file added as a Registry Run Key on a Financials partner’s host.
  • Further investigation by Blackpoint’s Active SOC team identified that the .jar file was a malicious remote access trojan (RAT), dubbed Ratty. Active SOC analysts also found:
    • A .zip file also associated with Ratty RAT activity;
    • Another potentially malicious process, javaw.exe, calling out to several IP addresses located in Germany, Netherlands, and New York; and
    • No signs of lateral movement.
  • The Active SOC isolated the affected host to avoid additional unauthorized and malicious activities, then reached out to the Financials partner with more information and remediation advice.

More About Ratty RAT

Click for details

Ratty is an open-source JavaScript remote access trojan (RAT), available on GitHub and promoted on cybercriminal forums. Ratty RAT allows threat actors to (1):

  • Run commands remotely,
  • Collect system data,
  • Take screenshots,
  • Collect keystrokes to harvest credentials, and
  • Record audio and video from infected devices.

Threat actors deploy Ratty RAT via social engineering attacks – typically phishing emails with malicious attachments.

Ratty RAT’s widespread availability and utility leads to its use by multiple threat groups, making post-incident attribution more difficult.

APG Threat Analysis of Ratty RAT for 2024

Click for details

The APG predicts that threat actors will likely continue to deploy Ratty RAT over the next 12 months.

We base this assessment on internal Blackpoint observed attacks, in addition to external incident reports that detail the use of Ratty RAT for persistence and harvesting sensitive data.

  • In 2021, security researchers with Infoblox Threat Intel reported a social engineering campaign that resulted in Ratty RAT deployment (1).
    • The malicious emails appeared to contain shipping instructions and included a .jar attachment.
  • In 2024, eSentire security researchers reported a tax-themed phishing campaign that deployed Ratty RAT (2).
    • The phishing email ultimately distributing Ratty RAT contained a malicious .zip attachment with a JAR payload.
    • Threat actors then attempted to gain persistence using Ratty RAT via Startup and Registry Run Keys.

Recommended Ratty RAT Mitigations and Remediations

Click for details

Blackpoint’s APG recommends the following actions to help mitigate the deployment of Ratty RAT.

  • Conduct employee security awareness training, including how to spot a phishing email and how and when to report them to an incident response authority. As many threat actors still rely on social engineering tactics to gain initial access, security training can help lower the risk of falling victim to download malicious software or legitimate tools for malicious actions.
  • Regularly audit and both environment and endpoints, which includes monitoring java and javaw processes. Ratty RAT has a proven history of using these processes, and abnormal use could indicate malicious activity.
  • Implement the practice of least privilege, which will help ensure regular user accounts are unable to install certain tools and conducting certain activities.
  • Operate from a zero trust mentality, which assumes that all requests to each resource are malicious unless proven and authenticated otherwise, and embodies aggressive and continuous monitoring and management.

Return to Top

AsyncRAT Incident with Legal Services Partner on July 22, 2024

Topline Takeaways

  • Industry target: Legal Services
  • Attacker information:
    • AsyncRAT
    • .iso initial access file
    • Scheduled tasks “CCleanData” and “Error”
  • Antivirus (AV) and / or EDR present in environment? No
  • Threat assessment for partners:
    • The Adversary Pursuit Group (APG) predicts that it is likely that threat actors will continue to deploy AsyncRAT to exploit other Legal Services organizations over the next 12 months.
  • Recommended remediations and mitigations:
    • Heuristics-based activity monitoring and remediation
    • Password managers
    • Scripting language controls
    • Least-privilege access controls

AsyncRAT Incident Timeline for 2024-07-22

  • Blackpoint’s MDR+R technology alerted to a suspicious PowerShell callout on a Legal Services partner host.
  • Initial analysis by Active SOC analysts found that the suspicious callout retrieved a payload from an external domain, which then executed in the host’s memory. Further investigation uncovered:
    • The activity originating from a malicious scheduled task, “CCleanData”, with the threat actor creating another scheduled task (“Error”) for persistence;
    • An .iso file as the threat’s initial access vector, after it was downloaded by the Legal Services partner’s affected user; and
    • Additional behavior inline with AsyncRAT malware.
  • The Active SOC team deleted the malicious scheduled tasks created for persistence and isolated the affected Legal Services partner’s host, then reached out the partner with more information and additional remediation advice.

More About AsyncRAT

Click for details

Active since 2019, AsyncRAT is another frequently used remote access trojan (RAT) whose capabilities include but are not limited to (3):

  • Capturing keystrokes on the victim’s machine,
  • Gaining persistence via scheduled tasks,
  • Viewing the endpoint’s screen, and
  • Examining running processes

In a new joint cybersecurity advisory released on July 25, 2024 (12), the FBI and CISA (among other organizations) list AsyncRAT as one of several “commodity malware” tools deployed by North Korean threat actor groups.

Note, however, that the APG does not attribute this incident as specifically carried out by any North Korean threat group, as “[the] use of publicly available malware enables the [North Korean threat] actors to conceal and obfuscate their identities and leads to attribution problems” (12).

APG Threat Analysis of AsyncRAT for 2024

Click for details

The APG predicts that threat actors will likely continue to deploy AsyncRAT for persistence over the next 12 months.

We base this assessment on numerous Active SOC-observed attacks within Blackpoint-protected environments, including other publicly analyzed attacks on:

In addition to the APG’s own internal analysis, external researchers often discover and observe AsyncRAT in their incident reporting, including:

  • In February 2024, Red Canary researchers reported that AsyncRAT was tied for the 7th most frequently observed malware within their customer environments for the month of January 2024 (7).
    • The researchers reported that 3LOSH – a crypter frequently used to package and deliver RATs – delivered AsyncRAT.
  • In June 2024, ConnectWise researchers reported AsyncRAT as the top malware variant observed within their client’s environments (8). Researchers reported that the AsyncRAT malware is:
    • Written in .NET,
    • Used by multiple threat groups, and
    • “Revered” for its customizability and evasion techniques.

Recommended AsyncRAT Mitigations and Remediations

Click for details

Blackpoint’s APG recommends the following actions to help mitigate AsyncRAT infections.

  • Monitor system activity through heuristics-based triggers and alerts, which can help identify legitimate software being installed or used in suspicious or abnormal methods and identify behaviors.
  • Require the use of secure password managers and disable the storage of plaintext passwords and local password caching, making password access more difficult.
  • Minimize the use of – or implement strict controls on – the use of scripting languages. Restricting script use for users who should not be conducting this type of activity for regular business operations can limit a threat actors’ ability to deploy malicious scripts on compromised user instances.
  • Implement the practice of least privilege, which will help ensure regular user accounts are unable to install certain tools and conduct certain activities associated with malware.

Return to Top

SYS01 Stealer Incident with Technology Partner on July 23, 2024

Topline Takeaways

  • Industry target: Technology
  • Attacker information:
    • SYS01 Stealer
    • .exe file for initial access
    • Scheduled tasks “WDNA” and “WDNA_LG”
    • Telegram
  • Antivirus (AV) and / or EDR present in environment? Yes
  • Threat assessment for partners:
    • The Adversary Pursuit Group (APG) predicts that it is likely that threat actors will continue to use SYS01 Stealer to exploit other Technology organizations over the next 12 months.
  • Recommended remediations and mitigations:
    • Password managers
    • Employee security training
    • Dedicated software center
    • Multifactor authentication (MFA)

SYS01 Stealer Incident Timeline for 2024-07-23

  • Blackpoint’s MDR+R alerted to potential SYS01 stealer activity on a Technology partner’s host.
  • Analysis by the Active SOC team identified the initial access .exe file, with further investigation finding:
    • The SYS01 stealer established post-intrusion persistence via two scheduled tasks: “WDNA” and “WDNA_LG”;
    • The scheduled tasks used rhc.exe, php.exe, and index.php to attempt persistent and continuous credential exfiltration; and
    • The SYS01 stealer exfiltrated the affected user’s stolen credentials via Telegram – installed the same day of the malicious activity.
  • Active SOC analysts isolated the affected host and deleted the scheduled tasks, before contacting the Technology partner to inform them of the incident and provide mitigation advice.

More About SYS01 Stealer

Click for details

SYS01 Stealer (AKA Album Stealer, S1deload Stealer) is an information stealer that has been active since 2022. The malware was originally written in C#, while newer versions are written in PHP (9).

Threat actors often deploy SYS01 Stealer malware via phishing emails with malicious attachments and fake Facebook profile pages that lure victims into clicking a link. The malware then attempts to gain persistence via Registry Run Keys and scheduled tasks.

When deployed on a victim’s machine, the SYS01 Stealer malware collects information, including:

  • System information, such as model/manufacturer;
  • Stored credentials;
  • Browser data; and
  • Facebook data.

APG Threat Analysis of SYS01 Stealer for 2024

Click for details

The APG predicts that threat actors will likely continue to deploy SYS01 Stealer for credential access over the next 12 months.

We base this assessment on internal Blackpoint observed attacks, as well as external reporting related to the use of SYS01 Stealer for credential access and collection of sensitive data.

  • In March 2023, Morphisec researchers reported a SYS01 Stealer campaign targeting government and manufacturing entities (10).
    • This campaign reportedly began with luring a victim to click on a URL from a fake Facebook profile or advertisement to download a ZIP file.
  • In July 2024, Trustwave security researchers released details of a new SYS01 Stealer (11). This new malware version can:
    • Take over Facebook accounts,
    • Steal credential information, and
    • Leverage legitimate accounts to further spread the malware.

Recommended SYS01 Stealer Mitigations and Remediations

Click for details

Blackpoint’s APG recommends the following actions to help mitigate the deployment of the SYS01 Stealer.

  • Require the use of secure password managers and disable the storage of plaintext passwords and local password caching, making passwords access more difficult for credential stealers such as SYS01.
  • Conduct employee security awareness training, covering how users can:
    • Spot a phishing email,
    • Recognize suspicious ads, and
    • Avoid malicious and suspicious posts/links on social media.
  • Enable multi-factor authentication (MFA), which can help identify malicious or anomalous logins and require an additional step for securing user accounts.
  • In addition to MFA requirements, organizations can implement and enforce VPNs where feasible, to ensure only identified and authorized employees can access sensitive data and resources with an additional level of credential authentication.

References and Resources

A quick note on incident details:

As these analyses concern recent incidents in actively monitored environment, certain details may be occasionally omitted and / or obfuscated, to better secure our partners and protect any still-ongoing investigations.

However, we felt that these incidents were important enough to bring to the community’s attention as fast as possible, and so included them in this public writeup.

Please feel free to reach out to the APG directly if you have any questions about a specific incident!

Click for full reference list
  1. Infoblox’s Blog: “FAKE SHIPPING EMAILS DELIVER RATTY RAT” by Avinash Shende on 2021-08-27
  2. eSentire’s Blog: “Beware the Bait: Java RATs Lurking in Tax Scam Emails” by eSentire Threat Response Unit on 2024-02-26
  3. MITRE’s Repository: “AsyncRAT” by MITRE on 2023-10-10
  4. Blackpoint Cyber’s Blog: “CrowdStrike BSOD Help, Advanced IP Scanner, TeamViewer, NetSupport RAT, & AsyncRAT” by Blackpoint Cyber on 2024-07-19
  5. Blackpoint Cyber’s Blog: “AsyncRAT, NetSupport RAT, and VssAdmin Abuse for Shadow Copy Deletion” by Blackpoint Cyber on 2024-06-21
  6. Blackpoint Cyber’s Blog: “RATs, Malicious PC Hunter, AnyDesk Abuse, and Malicious PowerShell Scripts” by Blackpoint Cyber on 2024-04-26
  7. Red Canary’s Blog: “Intelligence Insights: February 2024” by The Red Canary Team on 2024-04-30
  8. ConnectWise’s Blog: “Monthly Threat Brief: June 2024” by Bryson Medlock on 2024-07-22
  9. Trustwave’s Blog: “Facebook Malvertising Epidemic – Unraveling a Persistent Threat: SYS01” by Trustwave SpiderLabs on 2024-07-15
  10. Morphisec’s Blog: “How SYS01 Stealer Will Get Your Sensitive Facebook Info” by Arnold Osipov on 2023-03-07
  11. Trustwave’s Whitepaper: “Facebook Malvertising Epidemic” by Trustwave SpiderLabs on 2024-07-15
  12. Federal Bureau of Investigation (FBI)’s Joint Cybersecurity Advisory: “North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs” by The Department of Justice, the Cyber National Mission Task Force, CISA, DoD Cyber Center, NSA, National Inteligence Service, Korean National Police Agency, and the National Cyber Security Centre on 2024-07-25