Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Anti-Virus Discussion & News...  <--  <--- Return to Home Page
   Networked Database  Anti-Virus Discussion & News...   [22 / 262] RSS
 From   To   Subject   Date/Time 
Message   Ben Ritchey    All   US CERT Warning   December 1, 2016
 12:35 PM *  

TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:


TA16-336A: Avalanche (crimeware-as-a-service infrastructure)
12/01/2016 12:00 AM EST

Original release date: December 01, 2016
Systems Affected

Microsoft Windows
Overview

ôAvalancheö refers to a large global network hosting infrastructure used by 
cyber criminals to conduct phishing and malware distribution campaigns and 
money mule schemes. The United States Department of Homeland Security (DHS), in
 
collaboration with the Federal Bureau of Investigation (FBI), is releasing this
 
Technical Alert to provide further information about Avalanche.
Description

Cyber criminals utilized Avalanche botnet infrastructure to host and distribute
 
a variety of malware variants to victims, including the targeting of over 40 
major financial institutions. Victims may have had their sensitive personal 
information stolen (e.g., user account credentials). VictimsÆ compromised 
systems may also have been used to conduct other malicious activity, such as 
launching denial-of-service (DoS) attacks or distributing malware variants to 
other victimsÆ computers.

In addition, Avalanche infrastructure was used to run money mule schemes where 
criminals recruited people to commit fraud involving transporting and 
laundering stolen money or merchandise.

Avalanche used fast-flux DNS, a technique to hide the criminal servers, behind 
a constantly changing network of compromised systems acting as proxies.

The following malware families were hosted on the infrastructure:

    Windows-encryption Trojan horse (WVT) (aka Matsnu, 
Injector,Rannoh,Ransomlock.P)
    URLzone (aka Bebloh)
    Citadel
    VM-ZeuS (aka KINS)
    Bugat (aka Feodo, Geodo, Cridex, Dridex, Emotet)
    newGOZ (aka GameOverZeuS)
    Tinba (aka TinyBanker)
    Nymaim/GozNym
    Vawtrak (aka Neverquest)
    Marcher
    Pandabanker
    Ranbyus
    Smart App
    TeslaCrypt
    Trusteer App
    Xswkit

Avalanche was also used as a fast flux botnet which provides communication 
infrastructure for other botnets, including the following:

    TeslaCrypt
    Nymaim
    Corebot
    GetTiny
    Matsnu
    Rovnix
    Urlzone
    QakBot (aka Qbot, PinkSlip Bot)

Impact

A system infected with Avalanche-associated malware may be subject to malicious
 
activity including the theft of user credentials and other sensitive data, such
 
as banking and credit card information. Some of the malware had the capability 
to encrypt user files and demand a ransom be paid by the victim to regain 
access to those files. In addition, the malware may have allowed criminals 
unauthorized remote access to the infected computer. Infected systems could 
have been used to conduct distributed denial-of-service (DDoS) attacks.
Solution

Users are advised to take the following actions to remediate malware infections
 
associated with Avalanche:

    Use and maintain anti-virus software û Anti-virus software recognizes and 
protects your computer against most known viruses. Even though parts of 
Avalanche are designed to evade detection, security companies are continuously 
updating their software to counter these advanced threats. Therefore, it is 
important to keep your anti-virus software up-to-date. If you suspect you may 
be a victim of an Avalanche malware, update your anti-virus software 
definitions and run a full-system scan. (See Understanding Anti-Virus Software 
for more information.)
    Avoid clicking links in email û Attackers have become very skilled at 
making phishing emails look legitimate. Users should ensure the link is 
legitimate by typing the link into a new browser (see Avoiding Social 
Engineering and Phishing Attacks for more information).
    Change your passwords û Your original passwords may have been compromised 
during the infection, so you should change them. (See Choosing and Protecting 
Passwords for more information.)
    Keep your operating system and application software up-to-date û Install 
software patches so that attackers cannot take advantage of known problems or 
vulnerabilities. You should enable automatic updates of the operating system if
 
this option is available. (See Understanding Patches for more information.)
    Use anti-malware tools û Using a legitimate program that identifies and 
removes malware can help eliminate an infection. Users can consider employing a
 
remediation tool. A non-exhaustive list of examples is provided below. The U.S.
 
Government does not endorse or support any particular product or vendor.

          ESET Online Scanner

          https://www.eset.com/us/online-scanner/

          F-Secure

          https://www.f-secure.com/en/web/home_global/o...

          McAfee Stinger

          http://www.mcafee.com/us/downloads/free-tools...

          Microsoft Safety Scanner

          https://www.microsoft.com/security/scanner/en...

          Norton Power Eraser

          https://norton.com/npe
References

    https://www.us-cert.gov/sites/default/files/p...
    http://www.bankinfosecurity.com/avalanche-gro...

Revision History

    December 1, 2016: Initial release

This product is provided subject to this Notification and this Privacy & Use 
policy.
A copy of this publication is available at www.us-cert.gov. If you need help or
 
have questions, please send an email to info@us-cert.gov. Do not reply to this 
message since this email was sent from a notification-only address that is not 
monitored. To ensure you receive future US-CERT products, please add 
US-CERT@ncas.us-cert.gov to your address book.
OTHER RESOURCES:
Contact Us | Security Publications | Alerts and Tips | Related Resources
STAY CONNECTED:
Sign up for email updates

SUBSCRIBER SERVICES:
Manage Preferences  |  Unsubscribe  |  Help
This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf of:
 
United States Computer Emergency Readiness Team (US-CERT) ╖ 245 Murray Lane SW 
Bldg 410 ╖ Washington, DC 20598 ╖ (888) 282-0870         Powered by GovDelivery
=== Cut ===


╓─ Keep the faith, ──────────────────────────────────────────────────╖
│                                                                    │
│    Ben  aka cMech  Web: http|ftpinkp|telnet://cmech.dynip.com    │
│                  Email: fido4cmech(at)lusfiber.net                 │
│              Home page: http://cmech.dynip.com/homepage/           │
╙─────────── WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1 ───╜

... Calvin: I've changed my mind, Hobbes.  People are scum.
--- GoldED+/W32-MSVC v1.1.5 via Mystic BBS
 * Origin: FIDONet - The Positronium Repository (1:393/68)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Anti-Virus Discussion & News...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0811 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.0.140505

Warning: Unknown: open(c:\Sessions\sess_90rodgds3o03ne9ejrcus45sm2, O_RDWR) failed: No such file or directory (2) in Unknown on line 0 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (c:\Sessions) in Unknown on line 0 PHP Warning: session_start(): open(c:\Sessions\sess_90rodgds3o03ne9ejrcus45sm2, O_RDWR) failed: No such file or directory (2) in D:\wc5\http\public\VADV\include\common.inc.php on line 45 PHP Warning: Unknown: open(c:\Sessions\sess_90rodgds3o03ne9ejrcus45sm2, O_RDWR) failed: No such file or directory (2) in Unknown on line 0 PHP Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (c:\Sessions) in Unknown on line 0