<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Recorded Future</title>
        <link>https://www.recordedfuture.com/feed/research</link>
        <description>Real-Time Security Intelligence</description>
        <lastBuildDate>Tue, 27 Jun 2023 00:00:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Recorded Future, Inc.</generator>
        <language>en</language>
        <copyright>Copyright © 2022 Recorded Future, Inc.</copyright>
        <item>
            <title><![CDATA[The Escalating Global Risk Environment for Submarine Cables]]></title>
            <link>https://www.recordedfuture.com/escalating-global-risk-environment-submarine-cables</link>
            <guid>https://www.recordedfuture.com/escalating-global-risk-environment-submarine-cables</guid>
            <pubDate>Tue, 27 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>Insikt Group research examines the complex and dynamic risk environment of submarine cables, the information superhighways that underpin the global economy and facilitate worldwide telecommunications. The rapid expansion of the submarine cable network in the 21st century, driven by data demands, cloud computing, and the needs of hyperscalers like Amazon, Google, Meta, and Microsoft, must contend with converging geopolitical, physical, and cyber threats. State actors pose the greatest threat in terms of sabotage and spying, followed by non-state actors like hacktivists and ransomware groups, who pose a less capable and lower likelihood threat to the networks and operating systems that submarine cables rely upon. Accidental damage from ships and fishing vessels is more frequent but less impactful.</p><p><img src="https://cms.recordedfuture.com/uploads/escalating_global_risk_001_e6df8bfbd7.png" alt="escalating-global-risk-001.png"><em>Map of submarine cables as of May 16, 2023 (Source: TeleGeographys <a href="https://www.submarinecablemap.com/">Submarine Cable Map</a>)</em></p><p>Major geopolitical developments, specifically Russia&#39;s conflict with Ukraine, China&#39;s preparations for potential forceful unification with Taiwan, and the deterioration of US-China relations, are likely to fuel physical attacks and intelligence collection efforts against submarine cables. Notably, Russia has shown intent to map the submarine cable system in the Atlantic Ocean and North Sea, very likely for potential sabotage. The impact of these attacks will vary widely, ranging from intermittent traffic disruptions to widespread outages that take days or weeks to resolve, depending on the redundancy and resiliency of the affected network. State actors seeking an espionage edge will almost certainly target the entire submarine cable ecosystem for intelligence collection: landing station infrastructure, the submarine cables themselves, third-party providers, and the hardware and software that knits it all together. </p><p>Other major developments in the production, ownership, and operation of submarine cables have introduced new geopolitical challenges and created potential vulnerabilities. The rise of Chinese state-owned enterprises as cable owners, operators, and producers has elevated concerns over digital surveillance, while the expanding ownership stakes by hyperscalers has brought forward questions about market monopolies and digital sovereignty. Finally, the pursuit of expanded bandwidth capacity within the submarine cable industry has led to the adoption of advanced network management systems, which could be exploited for cyberattacks.</p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2023-0627.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/escalating_global_risk_main_987e9e8dfe.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[North Korea’s Cyber Strategy]]></title>
            <link>https://www.recordedfuture.com/north-koreas-cyber-strategy</link>
            <guid>https://www.recordedfuture.com/north-koreas-cyber-strategy</guid>
            <pubDate>Fri, 23 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group analysis reveals that North Korea uses a cyber strategy centered around aggressive data collection and financial theft to primarily target Asia.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>New research by Recorded Futures Insikt Group examines North Koreas cyber strategy. Despite the ever-increasing number of cyberattacks publicly attributed to North Korea, the regime does not publish an official cyber-strategy doctrine. North Korea&#39;s cyber strategy is focused on aggressive information collection and financial theft operations to support its goals of maintaining the Kim family dynasty and unifying the Korean peninsula under its leadership. The regime conducts information collection to gain insights into the thinking of its adversaries and to access technology that can provide an advantage during times of conflict. Financial theft is used to fund the regime&#39;s activities, including its nuclear and missile programs. Despite its centralized leadership system, North Korea creatively targets a wide range of industries across different countries.</p><p>A quantitative analysis of 273 cyberattacks attributed to North Korean state-sponsored threat actors reveals that the regime primarily engages in cyber espionage and financial theft activities. While it has the capability to conduct disruptive or destructive cyberattacks, it rarely does so. South Korea and the United States are the most common targets, but North Korean threat actors have a global reach, targeting entities in at least 29 countries. Cryptocurrency heists are on the rise, but espionage remains the primary goal of North Korean cyberattacks.</p><p><img src="https://cms.recordedfuture.com/uploads/north_koreas_cyber_strategy_001_9afe035e8e.png" alt="north-koreas-cyber-strategy-001.png"><em>Breakdown of industry verticals of victims grouped by North Korean state-sponsored threat actors</em></p><p>North Korea&#39;s cyber strategy is part of its larger asymmetric strategy to achieve the perpetuation of the regime and the unification of the Korean peninsula. The regime has invested in STEM education and nurtures talented individuals in computer science. Students are sent to domestic and international institutions for further education and exposure to technology not easily accessible in North Korea due to sanctions. The regime also deploys IT workers for online services and freelance platforms, which may overlap with cyber operators.</p><p>The report presents a comprehensive analysis of cyberattacks attributed to North Korean state-sponsored threat actors. It examines the threat actor groups involved, their targets, purpose of the attacks, and geographical distribution. Kimsuky is the most common threat group, followed by Lazarus Group and APT37. The data set covers attacks from 2009 to 2023, with a significant increase in the number of reported cyberattacks from 2016 onwards. Kimsuky&#39;s activity has seen a dramatic increase in recent years.</p><p>Overall, North Korea&#39;s cyber strategy is focused on information collection, financial theft, and espionage. The regime has developed a considerable cyber capability and targets various industries globally. However, destructive cyberattacks are rare, and the regime continues to invest in training cyber operators to further its strategic goals.</p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-nk-2023-0622.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2023_0620_North_Korea_s_Cyber_Strategy_Main_Feature_96145be877.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities]]></title>
            <link>https://www.recordedfuture.com/bluedelta-exploits-ukrainian-government-roundcube-mail-servers</link>
            <guid>https://www.recordedfuture.com/bluedelta-exploits-ukrainian-government-roundcube-mail-servers</guid>
            <pubDate>Tue, 20 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[A new report details a campaign by the threat actor, BlueDelta, likely intended to enable intelligence-gathering to support Russia’s invasion of Ukraine.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>Recorded Future&#39;s Insikt Group, in partnership with Ukraine&#39;s Computer Emergency Response Team (CERT-UA), has uncovered a campaign targeting high-profile entities in Ukraine that was cross-correlated with a spearphishing campaign uncovered by Recorded Futures Network Traffic Intelligence. The campaign leveraged news about Russias war against Ukraine to encourage recipients to open emails, which immediately compromised vulnerable Roundcube servers (an open-source webmail software), using <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730">CVE-2020-35730</a>, without engaging with the attachment. We found that the campaign overlaps with historic BlueDelta activity exploiting the Microsoft Outlook zero-day vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397">CVE-2023-23397</a> in 2022. </p><p>The BlueDelta activity, identified by Insikt Group, appears to have been operational since November 2021. The campaign overlaps with activity <a href="https://cert.gov.ua/article/4905829">attributed</a> by CERT-UA to APT28 (also known as Forest Blizzard and Fancy Bear), which multiple Western governments attribute to the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). In this operation, BlueDelta primarily targeted Ukrainian organizations, including government institutions and military entities involved in aircraft infrastructure. </p><p>The BlueDelta campaign used spearphishing techniques, sending emails with attachments exploiting vulnerabilities (CVE-2020-35730, CVE-2020-12641, and CVE-2021-44026) in Roundcube to run reconnaissance and exfiltration scripts, redirecting incoming emails and gathering session cookies, user information, and address books. The attachment contained JavaScript code that executed additional JavaScript payloads from BlueDelta-controlled infrastructure. The campaign displayed a high level of preparedness, quickly weaponizing news content into lures to exploit recipients. The spearphishing emails contained news themes related to Ukraine, with subject lines and content mirroring legitimate media sources. </p><p><img src="https://cms.recordedfuture.com/uploads/bluedelta_exploits_ukrainian_government_001_4551bbfd5e.png" alt="bluedelta-exploits-ukrainian-government-001.png"><em>BlueDelta Outlook and Roundcube spearphishing infection chain overlap</em></p><p>BlueDelta has demonstrated a long-standing interest in gathering intelligence on entities in Ukraine and across Europe, primarily among government and military/defense organizations. The most recent activity very likely represents a continued focus on these entities and specifically those within Ukraine. We assess that BlueDelta activity is likely intended to enable military intelligence-gathering to support Russias invasion of Ukraine and believe that BlueDelta will almost certainly continue to prioritize targeting Ukrainian government and private sector organizations to support wider Russian military efforts.</p><p>Recorded Futures collaboration with CERT-UA further emphasizes the importance of partnerships between industry and governments to enable collective defense against strategic threats  in this case, Russias war against Ukraine.</p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0620.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/bluedelta_exploits_ukrainian_government_main_44a532e5b0.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[North Korea-Aligned TAG-71 Spoofs Financial Institutions in Asia and US]]></title>
            <link>https://www.recordedfuture.com/north-korea-aligned-tag-71-spoofs-financial-institutions</link>
            <guid>https://www.recordedfuture.com/north-korea-aligned-tag-71-spoofs-financial-institutions</guid>
            <pubDate>Tue, 06 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[TAG-71, linked to North Korea's APT38, targets global finance & venture firms, risking sensitive info exposure and business disruption.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>Insikt Group has discovered malicious cyber threat activity spoofing several financial institutions and venture capital firms in Japan, Vietnam, and the United States. The group responsible, referred to as Threat Activity Group 71 (TAG-71), has significant overlaps with the North Korean state-sponsored APT38. Between September 2022 and March 2023, Insikt Group discovered 74 domains and 6 malicious files associated with TAG-71&#39;s activities.</p><p>TAG-71 has previously been observed spoofing domains belonging to financial firms and cloud services in Japan, Taiwan, and the United States. In March 2022, Insikt Group identified 18 malicious servers tied to TAG-71, which were also linked to the publicly reported CryptoCore campaign. These servers were used for malware delivery, phishing, and command and control operations, often impersonating popular cloud services and cryptocurrency exchanges.</p><p>The North Korean government has a history of financially motivated intrusion campaigns, targeting cryptocurrency exchanges, commercial banks, and e-commerce payment systems worldwide. TAG-71&#39;s recent activities align with this pattern, indicating North Korea&#39;s ongoing efforts to generate funds while facing international sanctions. The spoofing of investment banking and venture capital firms poses risks such as exposure of sensitive information, legal consequences, disrupted negotiations, or damage to strategic investment portfolios.</p><p><img src="https://cms.recordedfuture.com/uploads/TAG_71_001_4547f282be.png" alt="TAG-71-001.png"><em>Select IOCs for TAG-71 mapped to the Diamond Model in the Recorded Future Intelligence Cloud</em></p><p>To mitigate TAG-71&#39;s activities, Insikt Group recommends configuring intrusion detection systems to block connections to the IP addresses and domains associated with the group. Clients of Recorded Future, Insikt Group&#39;s parent company, should also block command and control servers logged in the Command and Control Security Control Feed. Additionally, organizations should enforce security awareness among employees and customers to recognize phishing attempts, suspicious domains, and fraudulent documents. Monitoring for domain abuse and initiating takedowns of fraudulent domains through Recorded Future&#39;s Brand Intelligence module is also advised.</p><p>Overall, TAG-71&#39;s campaign aligns with North Korean state-sponsored threat actors&#39; past activities, posing risks to financial and investment firms and their customers. Implementing the recommended mitigation measures can help protect organizations from these malicious activities.</p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0606.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/north_korea_aligned_tag_71_spoofs_financial_institutions_0a34ec15cd.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Private Eyes: China’s Embrace of Open-Source Military Intelligence]]></title>
            <link>https://www.recordedfuture.com/private-eyes-chinas-embrace-open-source-military-intelligence</link>
            <guid>https://www.recordedfuture.com/private-eyes-chinas-embrace-open-source-military-intelligence</guid>
            <pubDate>Thu, 01 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Using advanced technology, the People's Liberation Army (PLA) leverages open-source intelligence (OSINT) for military advantage.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>The Peoples Liberation Army (PLA) is using new collection, processing, and analysis technologies to exploit the massive amount of open-source information available from the internet and other sources for military intelligence purposes. A growing ecosystem of private companies, state-owned enterprises, state-run research organizations, and universities is supporting the PLAs push to leverage open-source intelligence (OSINT) by providing research services, platforms, and data. The PLA almost certainly views OSINT as an increasingly valuable source of military intelligence that can support decision-making and necessitates the use of new collection, processing, and analysis technologies, which the PLA and Chinas defense industry are actively developing.</p><p>The PLA and Chinas defense industry almost certainly take advantage of other countries open information environments to extract OSINT from foreign governments, militaries, universities, defense industry companies, scientific research organizations, think tanks, news media outlets, social media platforms, forums, individuals, commercial data providers, print media, radio broadcasts, satellites, and other sources. This OSINT almost certainly provides the PLA insight into foreign military capabilities, facilities, doctrine, decision-making, weapons, equipment, science and technology, exercises, training, intelligence, and deployments, providing a clear intelligence advantage. </p><p>In addition to supporting decision-making, Chinese observers have suggested more specific uses for military OSINT as well, such as carrying out long-range maritime target tracking, enabling early warning of crises, supporting precision strikes, countering enemy propaganda, facilitating domestic science and technology innovation, and supporting training and talent development.</p><p>This report profiles 5 private Chinese OSINT providers that serve the PLA, including providers that mainly sell platform and database products, providers that primarily offer research and analysis services, and providers that specialize in remote sensing data. The PLA very likely uses this data to support decision-making and better understand potential foreign adversaries in preparation for future conflicts. Given that China is very unlikely to open up its information environment, and that Western countries are very unlikely to close off their information environments, the PLA will very likely maintain its advantage over Western militaries in OSINT.</p><p>To read the entire analysis with endnotes, as well as receive more information about the author, Zoe Haver, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2023-0601.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/private_eyes_chinas_embrace_open_source_military_intelligence_a1c40b59b1.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[I Have No Mouth, and I Must Do Crime]]></title>
            <link>https://www.recordedfuture.com/i-have-no-mouth-and-i-must-do-crime</link>
            <guid>https://www.recordedfuture.com/i-have-no-mouth-and-i-must-do-crime</guid>
            <pubDate>Thu, 18 May 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore deepfake voice cloning as an emerging AI threat, its potential impact, and how it's abused by cybercriminals in various attack scenarios.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>Deepfake voice cloning technology is an emerging risk to organizations, representing the evolution in the convergence of artificial intelligence (AI) threats. When leveraged in conjunction with other AI technologies  such as deepfake video technology, text-based large language models (LLMs, such as GPT), generative art, and others  the potential for impact increases. Voice cloning technology is currently being abused by threat actors in the wild. It has been shown to be capable of defeating voice-based multi-factor authentication (MFA), enabling the spread of misinformation and disinformation, and increasing the effectiveness of social engineering.</p><p>As outlined in our January 26, 2023, report <a href="https://www.recordedfuture.com/i-chatbot">I, Chatbot</a>, open-source or freemium AI platforms lower the barrier to entry for low-skilled and inexperienced threat actors seeking to break into cybercrime. These platforms ease-of-use and out-of-the-box functionality enable threat actors to streamline and automate cybercriminal tasks that they may not be equipped to act upon otherwise. One of the most popular voice cloning platforms on the market is ElevenLabs (elevenlabs[.]io), a browser-based text-to-speech (T2S; TTS) software that allows users to upload custom voice samples for a premium fee. Voice cloning technologies, such as ElevenLabs, lower the barrier to entry for inexperienced English-speaking cybercriminals seeking to engage in low-risk impersonation schemes and provide opportunities for more sophisticated actors to undertake high-impact fraud. Threat actors have begun to monetize voice cloning services, including developing their own cloning tools that are available for purchase on Telegram, leading to the emergence of voice-cloning-as-a-service (VCaaS).</p><p><img src="https://cms.recordedfuture.com/uploads/have_no_mouth_001_dfb44c0d41.png" alt="have-no-mouth-001.png"><em><strong>References to voice cloning on dark web sources significantly increase from May 2020 to May 2023</strong></em> </p><p>Voice cloning samples that surface on social media, messaging platforms, and dark web sources often leverage the voices of public figures  such as celebrities, politicians, and internet personalities (influencers)  and are intended to create either comedic or malicious content. This content, which is often racist, discriminatory, or violent by nature, enables the spread of disinformation, as users on social media are sometimes deceived by the high quality of the voice cloning sample.</p><p>In order to mitigate current and future threats, organizations must address the risks associated with voice cloning while such technologies are in their infancy. Risk mitigation strategies need to be multidisciplinary, addressing the root causes of social engineering, phishing and vishing, disinformation, and more. Voice cloning technology is still leveraged by humans with specific intentions  it does not conduct attacks on its own. Therefore, adopting a framework that educates employees, users, and customers about the threats it poses will be more effective in the short-term than fighting abuse of the technology itself  which should be a long-term strategic goal.</p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0518.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/i_have_no_mouth_and_i_must_do_crime_5f42a07a66.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[OilAlpha: A Likely Pro-Houthi Group Targeting Entities Across the Arabian Peninsula]]></title>
            <link>https://www.recordedfuture.com/oilalpha-likely-pro-houthi-group-targeting-arabian-peninsula</link>
            <guid>https://www.recordedfuture.com/oilalpha-likely-pro-houthi-group-targeting-arabian-peninsula</guid>
            <pubDate>Tue, 16 May 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group tracks OilAlpha, a threat group targeting NGOs, media, and others interested in Yemen. Predominantly using Android RATs and DDNS for C2, it's likely pro-Houthi.]]></description>
            <content:encoded><![CDATA[<p>Since May 2022, Insikt Group has tracked an ongoing campaign by the threat group, OilAlpha,; which we are linking to threat actors that likely support a pro-Houthi movement agenda. </p><p>The group is highly likely to have targeted entities associated with the non-governmental, media, international humanitarian, and development sectors. It is almost certain that the entities targeted shared an interest in Yemen, security, humanitarian aid, and reconstruction matters. The groups operations have reportedly included targeting persons attending Saudi Arabian government-led negotiations; coupled with the use of spoofed Android applications mimicking entities tied to the Saudi Arabian government, and a UAE humanitarian organization (among others). As of this writing, we suspect that the attackers targeted individuals the Houthis wanted direct access to.</p><p><img src="https://cms.recordedfuture.com/uploads/Oil_Alpha_001_51462e5c96.png" alt="OilAlpha-001.png"><img src="https://cms.recordedfuture.com/uploads/Oil_Alpha_002_0b2482e2b8.png" alt="OilAlpha-002.png"><img src="https://cms.recordedfuture.com/uploads/Oil_Alpha_003_17f06fa560.png" alt="OilAlpha-003.png"><em>Messages reportedly sent to targets from Saudi Arabian telephone numbers (Source: Meta <a href="https://www.facebook.com/adenfree/photos/pcb.5489087581123113/5489087411123130/">1</a>, <a href="https://www.facebook.com/adenfree/photos/pcb.5489087581123113/5489087484456456">2</a>, <a href="https://www.facebook.com/adenfree/photos/pcb.5489087581123113/5489087481123123">3</a>)</em></p><p>OilAlpha has almost exclusively relied on infrastructure associated with the Public Telecommunication Corporation (PTC), a Yemeni government-owned enterprise reported to be under the direct control of the Houthi authorities. OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets. It has also used URL link shorteners. Per victimology assessment, it appears a majority of the targeted entities were Arabic-language speakers and operated Android devices.  </p><p>OilAlpha threat actors are highly likely to be involved in espionage activity, as handheld devices were targeted with remote access tools (RATs) like SpyNote and SpyMax. We have also observed njRAT samples communicating with C2s associated with this group, making it likely that OilAlpha has used other malware for testing or attack operations.</p><p>Barring the discovery of new information or broader geostrategic shifts, OilAlpha is likely to continue to use malicious Android-based applications to target entities that share an interest in Yemens political and security developments and the humanitarian and NGO sectors that operate in Yemen.</p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0516.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/oilalpha_likely_pro_houthi_group_targeting_arabian_peninsula_2aebae6036.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Latin America's Second "Pink Tide" Opens Avenues for Iranian Influence]]></title>
            <link>https://www.recordedfuture.com/latin-americas-second-pink-tide-opens-avenues-iranian-influence</link>
            <guid>https://www.recordedfuture.com/latin-americas-second-pink-tide-opens-avenues-iranian-influence</guid>
            <pubDate>Thu, 11 May 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how Iran gains influence in Latin America through soft power, strategic partnerships, and leveraging online media and cultural centers.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p>Latin America is currently experiencing a resurgence of the political left and far left, as left-leaning and far-left leaders now govern the majority of countries in the region. We define the start of this resurgence, sometimes termed a second <a href="https://www.aljazeera.com/opinions/2022/10/23/the-us-can-no-longer-ignore-change-in-latin-america">Pink Tide</a>  (the first having occurred in the early 2000s)  as December 2018, when Mexican president Andrs Manuel Lpez Obrador entered office; his election was the first in a wave of notable left-wing electoral victories in Latin America. As Latin America trends left, it also increasingly rejects United States (US) influence, which formerly played an outsized role in regional affairs, thereby opening avenues for China, Russia, and Iran to expand their activities in the region. While <a href="https://www.cfr.org/backgrounder/china-influence-latin-america-argentina-brazil-venezuela-security-energy-bri">Chinese</a> and <a href="https://carnegieendowment.org/2018/05/03/russia-playing-geopolitical-game-in-latin-america-pub-76228">Russian</a> diplomacy and investments in Latin America have been examined extensively, less has been made of Irans efforts to deepen its ties to the region. Irans activities in Latin America deserve close analysis in light of the Iranian governments persistently <a href="https://www.unitedagainstnucleariran.com/irans-malign-intelligence-activities">malign</a> and destabilizing activities and its governments <a href="https://www.state.gov/reports/country-reports-on-terrorism-2020/iran/#:~:text=Designated%20as%20a%20State%20Sponsor,elsewhere%20throughout%20the%20Middle%20East.">sponsorship</a> of terrorism.</p><p>In light of changing leadership in Latin America, Iran has found new opportunities to increase its political and economic footprint  especially in Brazil, Colombia, Argentina, and Chile. At the same time, Iran has strengthened ties with its steadfast allies, Venezuela, Cuba, and Nicaragua. Most notably, Iran and Venezuela have significantly increased their energy trade to circumvent and mitigate sanctions. </p><p><img src="https://cms.recordedfuture.com/uploads/pink_tide_001_2828148bad.png" alt="pink-tide-001.png">Venezuelan president Nicols Maduro and Iranian president Ebrahim Raisi  meet in Tehran, June 2022 (Source: <a href="https://www.aljazeera.com/news/2022/6/11/iran-venezuela-sign-20-year-cooperation-plan-during-maduro-visit">Aljazeera</a>)</p><p>In Latin America, Tehran seeks to expand trade relationships to mitigate the effects of US sanctions and ensure food security, and develop political partnerships to widen its sphere of influence. Iran will almost certainly seek to increase trade relationships, cooperation agreements, and diplomatic engagements with its steadfast allies in the region, and continue to make inroads with powerful democracies led by left-wing governments, especially Brazil, Argentina, Colombia, and Chile. </p><p>Iran will very likely continue to capitalize on opportunities presented by left-wing and anti-American leaders in Latin America to further expand its presence in the region, with a focus on energy deals and other economic partnerships. Outside of government-to-government channels, Iran gains influence in the region using online media, including covert state-sponsored information operations on social media and influences Latin American audiences through Iran-backed cultural and religious centers. In June 2022, Iran also <a href="https://beforeitsnews.com/global-unrest/2022/10/brazil-iran-relations-set-to-boost-as-tehran-advances-brics-admission-process-2536587.html">applied</a> for membership to the BRICS Union of countries, comprising Brazil, Russia, India, China, and South Africa. If Iran is able to gain membership, it will likely use this status, along with other multilateral bodies, to legitimize its presence in Latin America and appear as a responsible and influential power broker. </p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2023-0511.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/latin_americas_second_pink_tide_opens_avenues_iranian_influence_9fc728c7f5.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Xiaoqiying/Genesis Day Threat Actor Group Targets South Korea, Taiwan]]></title>
            <link>https://www.recordedfuture.com/xiaoqiying-genesis-day-threat-actor-group-targets-south-korea-taiwan</link>
            <guid>https://www.recordedfuture.com/xiaoqiying-genesis-day-threat-actor-group-targets-south-korea-taiwan</guid>
            <pubDate>Thu, 20 Apr 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group shares research on Xiaoqiying (Genesis Day, Teng Snake), a Chinese hacktivist group, targeting South Korean, Japanese, and Taiwanese organizations.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p>Xiaoqiying (aka Genesis Day, Teng Snake) is a primarily Chinese-speaking threat group that is most well known for conducting website defacement and data exfiltration attacks on more than a dozen South Korean research and academic institutions in late-January 2023. New research from Recorded Futures Insikt Group has found that more recently, the groups affiliated threat actors have signaled a new round of cyberattacks against organizations in Japan and Taiwan. Although it shows no clear ties to the Chinese government, Xiaoqiying is staunchly pro-China and vows to target NATO countries as well as any country or region that is deemed hostile to China.</p><p>Since January 25, 2023, open-source reporting from South Korea has revealed a mass cyberattack against websites belonging to 12 South Korean research and academic institutions during the Lunar New Year holiday conducted by Xiaoqiying. According to Korea Internet &amp; Security Agency (KISA) reports, all 12 of the websites suffered website defacements in which the adversaries replaced each hosted website with their own in a compromised server. KISA also identified IP addresses linked with the attack to origins within various countries such as China, the US, Singapore, and Taiwan. Based on a <a href="https://www.koreatimes.co.kr/www/nation/2023/01/113_344179.html">report</a> from The Korea Times (koreatimes.co.kr), the Chinese threat group disclosed on its public Telegram channel that it included KISA as one of its potential targets and it is the first government agency targeted by the threat group. Other reports claimed that the threat group threatened to target approximately 2,000 government agencies, including South Koreas Ministry of Culture, Sports, and Tourism.</p><p>Our analysis of Xiaoqiyings activity on Telegram is based on 2 Telegram invitation links obtained in early January 2023. The Genesis Day threat group was active on Telegram up until February 2023 when the news of its alleged breaches reached the media. Then, both Telegram channels went offline. These 2 Telegram channels included an announcement channel and a member channel and consisted primarily of Chinese-speaking users. From analyzing the downloaded data, we identified the threat groups administrators, tools and data shared among members, tactics, techniques, and procedures (TTPs) used by the threat group, and connections with other special-access cybercriminal forums and threat actors. We also assessed the credibility of the offers and predicted the future course of action of the group. </p><p><img src="https://cms.recordedfuture.com/uploads/Xiaoqiying_001_0f8a1c3afa.png" alt="Xiaoqiying-001.png"></p><p style="font-size: 1rem; font-style: italic;">The new year message posted by Genesis Day on December 31, 2022, served as a summary for the groups activities in 2022 and a call to action for 2023. The English translation is provided below. (Source: Telegram)</p><p style="font-size: 1rem; font-style: italic;">In the upcoming year, this channel will plan to launch another round of operations against NATO members and related countries/regions that are hostile to China, to paralyze the network and infrastructure of these countries. We are actively cooperating with our global allies and APT members, our partners include but are not limited to APT 35, Corecode [sic], Anonymous, Lapsus, Hive, Pakistani APTs, Russian APTs, Solitbit.ares [sic], Prynt Stealer, . A world without China would be a meaningless world, we are only trying to restore this country to her rightful place. We strive to wield our swords at the dawn of this new era. You are welcomed to join us, expect us </p><p style="font-size: 1rem; font-style: italic;">Happy New Year everyone</p><p>The group claimed to be responsible for some unverified cyberattacks before the confirmed intrusions against numerous South Korean organizations in January and February 2023. As a result, we rate its credibility as moderate. It shared available penetration testing tools, malware, proofs of concept and exploits, and leaked data, and it claimed to have working relationships with some well-known cybercriminal and APT groups around the world. The group appears to be ambitious and is actively recruiting individuals with hacking skills. </p><p>The most recent postings by its affiliated threat actors on special-access forums shows it has possibly compromised new targets in Japan and Taiwan and signaled a new round of cyberattacks against these countries. We recommend that organizations that are possibly targeted by this group, especially education, research, and government organizations in the Asian Pacific region, maintain a frequent patching cadence for their internet-facing devices and disable any unnecessary remote access tools. </p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0420.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/xiaoqiying_genesis_day_threat_actor_group_targets_south_korea_taiwan_477843c21b.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Joker DPR and the Information War]]></title>
            <link>https://www.recordedfuture.com/joker-dpr-and-the-information-war</link>
            <guid>https://www.recordedfuture.com/joker-dpr-and-the-information-war</guid>
            <pubDate>Thu, 06 Apr 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group® reveals new research on Joker DPR, a pro-Russian hacktivist group influencing the Ukraine crisis. Learn about their tactics, impact, and possible ties to the Russian state.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p>Recorded Futures Insikt Group examines the pro-Russian hacktivist threat group Joker DPR, which has become more prominent during Russias ongoing invasion of Ukraine. The group is well-known for its alleged cyber activities, which have targeted and publicized sensitive information on Ukrainian military and government web resources, and for its social media presence, which it has exploited to disseminate pro-Russian, anti-Ukrainian propaganda. </p><p>To date, Joker DPRs most significant claim has been an alleged breach of DELTA, a battlefield management system (BMS) that has proven effective for Ukraines national defense. Joker DPRs alleged breach was unlikely to have been as wide-reaching as the threat group claimed. Nevertheless, it is part of a growing body of evidence that suggests Joker DPR is deliberately supporting Russias information war in Ukraine.</p><p><img src="https://cms.recordedfuture.com/uploads/joker_dpr_001_72f75b034c.png" alt=":joker-dpr-001.png"><em>Joker DPR is notorious for spreading pro-Russian, anti-Ukrainian propaganda. Here the threat group mocks the death of a pro-Ukrainian fighter in the Donbass.</em></p><p>Based on the alignment of Joker DPRs activities with the goals of Russian influence operations in Ukraine  specifically, undermining support for the Armed Forces of Ukraine (AFU) and Ukrainian government  it is likely that Joker DPRs activities are directed at amplifying Russian information operations in Ukraine, possibly with the coordination of the Russian state.</p><p>Joker DPR has cultivated a sophisticated persona. Although characterized as an individual in its communications, it is likely that Joker DPR is a threat group that is reliant upon a coordinated human infrastructure of Ukrainians who sympathize with Russia and like-minded threat actors to gather the sensitive information that the group publishes.</p><p>Joker DPR has built a sizable following on its Telegram channel. As its audience and infrastructure grows, it may gain the increased ability to undermine Ukraines war effort. Although Ukrainian authorities have not yet targeted Joker DPR, recent events suggest that they will make efforts to identify, arrest, and prosecute members of Joker DPRs network when they have the resources and opportunities to do so, or as the influence and threat level of Joker DPR grows. Although Joker DPRs alleged penetration of DELTA was unlikely to be as wide-reaching as the group claimed, similar activity may lead to the increased international scrutiny of pro-Russian hacktivist threat groups.</p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0406.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/joker_dpr_and_the_information_war_a624380fdb.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[With KEYPLUG, China’s RedGolf Spies On, Steals From Wide Field of Targets]]></title>
            <link>https://www.recordedfuture.com/with-keyplug-chinas-redgolf-spies-on-steals-from-wide-field-targets</link>
            <guid>https://www.recordedfuture.com/with-keyplug-chinas-redgolf-spies-on-steals-from-wide-field-targets</guid>
            <pubDate>Thu, 30 Mar 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group examines activity attributed to likely the Chinese state-sponsored actor, RedGolf targeting victims with KEYPLUG malware. ]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p><em>Recorded Futures Insikt Group has identified a large cluster of new infrastructure associated with usage of the custom Windows and Linux backdoor KEYPLUG, attributed to a highly-likely Chinese state-sponsored threat activity group tracked as RedGolf. RedGolf closely overlaps with threat activity reported under the aliases of APT41/BARIUM and reportedly has targeted US government entities. RedGolf has also reportedly <a href="https://www.justice.gov/opa/pr/seven-international-cyber-defendants-including-apt41-actors-charged-connection-computer">boasted</a> of connections to the the Chinese Ministry of State Security (MSS) and its members were previously <a href="https://intrusiontruth.wordpress.com/2022/07/23/the-people-behind-chengdu-404/">linked</a> to the Chengdu-based company Chengdu 404 Network Technology ().</em></p><p><em>RedGolf remains highly active within a wide range of geographies and is known to target aviation, automotive, education, government, media, information technology, and religious organizations. Organizations of strategic interest to the Chinese government and security services  are likely at increased risk of targeting. This report examines recent activity of the group, tactics, techniques, and procedures, and offers mitigation strategies for organizations.</em></p><p>According to public reporting, RedGolf <a href="https://www.mandiant.com/resources/blog/apt41-us-state-governments">used</a> a Linux version of the custom modular backdoor KEYPLUG to target US state government entities during 2021 and 2022. Insikt Group has identified a wider cluster of KEYPLUG samples and operational infrastructure used by RedGolf from at least 2021 to 2023. We actively track this malicious infrastructure using the term GhostWolf. Alongside KEYPLUG, we also identified RedGolf using Cobalt Strike, PlugX, and Dynamic DNS (DDNS) domains, all of which are commonly used amongst many Chinese state-sponsored threat groups. Insikt Group identified multiple infrastructure overlaps between publicly reported APT41/BARIUM campaigns across the identified GhostWolf infrastructure cluster.</p><p><img src="https://cms.recordedfuture.com/uploads/Teeing_Red_Golf_001_784f630661.png" alt="Teeing-RedGolf-001.png"><em>RedGolf infrastructure and TTPs (Tactics, Techniques, and Procedures) overlaps with APT41 and BARIUM. (Source: Recorded Future)</em></p><p>RedGolf will continue to target victims with KEYPLUG malware and its derivatives using command and control infrastructure spanning a variety of hosting providers. The group has previously utilized a mixture of both traditionally registered domains and DDNS domains, often featuring a technology theme. We believe this TTP will remain relatively unchanged with the exception of a decrease in DDNS use.</p><p>The employment of both Cobalt Strike and PlugX to target victim machines by Chinese state-sponsored threat activity groups, such as RedGolf, is highly likely to <a href="https://www.recordedfuture.com/2022-adversary-infrastructure-report">continue</a> given the feature set provided by these tools, their ready availability, and the ability to obfuscate responsibility due to the number of other threat actors using these techniques.</p><p>Recorded Future proactively detects both Cobalt Strike and PlugX servers. We recommend incorporating this feed into blocking lists and/or alerting to prevent infections.</p><p>To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0330.pdf">click here</a> to download the report as a PDF.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/teeing_up_redgolfs_new_operational_keyplug_infrastructure_3d1adbc690.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Russian Sanctions Evasion Puts Merchants and Banks at Risk]]></title>
            <link>https://www.recordedfuture.com/russian-sanctions-evasion-puts-merchants-banks-risk</link>
            <guid>https://www.recordedfuture.com/russian-sanctions-evasion-puts-merchants-banks-risk</guid>
            <pubDate>Thu, 23 Mar 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Uncover how prepaid cryptocurrency cards and mail forwarding services may enable sanctions evasion, putting financial institutions and merchants at risk of secondary sanctions.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0323.pdf">click here</a> to download the report as a PDF.</em></p><h2 id="executive-summary">Executive Summary</h2><p>Cybercriminals devise and execute various workarounds to legalize their illicit income. After international sanctions were leveled against Russia in the wake of Russias full-scale invasion of Ukraine, ordinary Russian consumers have likely resorted to similar workarounds to obtain goods produced abroad.</p><p>Recorded Future has identified prepaid cryptocurrency virtual credit cards and mail forwarding services  also known as reshippers  as methods that can potentially be exploited to illegally bypass sanctions. International financial institutions and merchants that are indirect participants of these workarounds may be at risk of falling under secondary sanctions. This risk could be greatly reduced by implementing more stringent verification procedures for the services and transactions involved in these workarounds.</p><h2 id="key-findings">Key Findings</h2><ul><li>Many crypto services allow customers to register prepaid cryptocurrency virtual credit cards with minimal or no verification. This lack of verification and dark web sources indicate that these prepaid cryptocurrency VCCs can be used for sanctions evasion.</li><li>Various mail forwarding services allow Russian customers to order goods produced from abroad. Purchases and deliveries can be funded through various means, including cryptocurrency and Russian-issued payment cards. Although these services publish lists of restricted goods that they claim they are unable to ship, dark web sources indicate that they can be used to receive goods that are subject to export controls.</li><li>We registered a prepaid cryptocurrency VCC using one of the crypto services described above. Open source analysis revealed the payment cards bank identification number (BIN) was issued by a US financial institution.</li><li>It is likely that additional financial institutions and merchants are also being enlisted as unwitting participants in sanctions evasion schemes that involve prepaid VCCs and mail forwarding services. If this is the case, they may be at risk of secondary sanctions.</li></ul><h2 id="background">Background</h2><p>Beginning on February 24, 2022, the US and 37 other countries implemented sweeping sanctions against Russia in response to its unprovoked invasion of Ukraine. These ongoing sanctions are explicitly intended to degrade Russias ability to wage war in Ukraine, and they include exhaustive restrictions on the export to Russia of luxury goods ranging from garments and accessories to high-end electronics, spirits, and even billiard sticks. [<a href="https://www.federalregister.gov/documents/2022/03/16/2022-05604/imposition-of-sanctions-on-luxury-goods-destined-for-russia-and-belarus-and-for-russian-and">1</a>, <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2022:087I:FULL&from=FI">2</a>] According to the US Bureau of Industry and Security (BIS), the proscription of these exports is intended to steadily increase the financial consequences on Russia  as a result of Russia&#39;s invasion of Ukraine. Altogether, these measures appear to be having the desired effect. In October 2022, the US Department of State <a href="https://www.state.gov/the-impact-of-sanctions-and-export-controls-on-the-russian-federation/#:~:text=Furthermore%2C%20sanctions%20(administered%20and%20enforced,its%20unjust%20war%20against%20Ukraine.">assessed</a> that US sanctions and export controls have severed Russias access to key technologies and industrial inputs that erode its military capability. Similarly, the European Council <a href="https://www.consilium.europa.eu/en/infographics/impact-sanctions-russian-economy/">estimated</a> that Russias GDP had contracted by anywhere from 2.2% to 3.9% in 2022, undermining Russias ability to finance its war.</p><p>Governments have not acted in isolation, either. Over 1,000 companies motivated by a combination of outrage and fear of secondary sanctions have voluntarily <a href="https://som.yale.edu/story/2022/over-1000-companies-have-curtailed-operations-russia-some-remain">suspended operations</a> in Russia. Among these are Visa and Mastercard, which at the time of their withdrawal controlled about 70% of the Russian debit card market.</p><p>At the same time, technical and legal barriers are unlikely to significantly harm Russian cybercriminals efforts to monetize their illicit earnings. We previously <a href="https://www.recordedfuture.com/russian-invasion-of-ukraine-and-sanctions-portend-rise-in-card-fraud">predicted</a> that international sanctions and the accompanying decisions of private companies to cease or reduce operations in Russia would likely encourage criminal buyers to reship and resell foreign goods on the Russian market. This is because any shortage of foreign goods on the Russian market that are obtained through legitimate sources likely creates corresponding demand for the same goods obtained through illicit sources. This presents cybercriminals with an opportunity to earn increased returns from their fraud cash-out schemes.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/russian_sanctions_evasion_puts_merchants_banks_risk_3bd90adbf0.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[IRS Cyberattack Highlights Risk of Tax Refund Fraud]]></title>
            <link>https://www.recordedfuture.com/irs-cyberattack-highlights-risk-of-tax-refund-fraud</link>
            <guid>https://www.recordedfuture.com/irs-cyberattack-highlights-risk-of-tax-refund-fraud</guid>
            <pubDate>Thu, 16 Mar 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group examines an IRS cyberattack allegedly carried out by the threat group Infinity Hackers BY, which highlights the threats posed by tax refund fraud.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0316.pdf">click here</a> to download the report as a PDF.</em></p><h2 id="executive-summary">Executive Summary</h2><p>Tax season began on January 23, 2023, and with it came the return of tax refund fraud.</p><p>Recently, the threat group Infinity Hackers BY claimed to have conducted a successful cyberattack against the IRS. Whether or not the attack actually occurred, the threat groups claim highlights the threat posed by tax refund fraud, also known as stolen identity refund fraud (SIRF). Tax refund fraud occurs when criminals use stolen tax forms and personally identifiable information (PII) to submit fraudulent tax returns with the goal of stealing their victims tax refunds.</p><p>Tax refund fraud incurs costs both for taxpayers and government agencies, particularly the IRS, and has demonstrated year-on-year growth in popularity across the dark web. In recent decades, electronic filing has simplified tax refund fraud; in order to conduct it, threat actors require only stolen tax forms and PII, which are often available for purchase on dark web sources, along with a fraudulently registered bank account.</p><h2 id="key-findings">Key Findings</h2><ul><li>Tax refund fraud has become an increasingly popular topic on dark web forums. For the past 3 years, dark web forum posts relating to tax refund fraud have shown year-on-year growth, and in 2022, we observed 78,032 references to the keyword tax on dark web marketplaces.</li><li>To conduct tax refund fraud, threat actors must obtain fraudulent or stolen tax forms, victim PII, and a fraudulently registered bank account before they submit a fraudulent tax return. Criminal tutorials, guides, references, and paid services simplify each of these tasks, ultimately facilitating tax refund fraud for inexperienced threat actors.</li><li>The availability of stolen tax forms and PII necessary to conduct tax refund fraud drive its popularity and increase the risk it poses. Both stolen tax forms and associated PII are widely available via breached databases and dark web marketplaces.</li></ul><h2 id="background">Background</h2><p>On January 12, 2023, the US Internal Revenue Service (IRS) announced that the 2023 tax season would begin on January 23, 2023. Tax season is now in full swing, and more than 168 million individual tax returns for the 2022 tax year are expected to be filed, accepted, and processed before the filing deadline of April 18, 2023.</p><p>The return of tax filing season throws <a href="https://www.recordedfuture.com/business-fraud-tax-refund-fraud">tax refund fraud</a>  also known as stolen identity refund fraud (SIRF)  into stark relief. By acquiring tax forms and sensitive personally identifiable information (PII) through data breaches, criminal services, and dark web resellers, criminals can file fraudulent tax returns under a victims name in order to steal their tax refund. Electronic filing means that fraudulent returns can be swiftly submitted and processed, and stolen refunds can easily be deposited into fraudulently registered bank accounts, sent to prepaid payment cards, or even used to fund criminals crypto accounts.</p><p>According to the US Department of Justice, tax refund fraud threaten[s] to disrupt the orderly administration of the income tax system for hundreds of thousands of law-abiding taxpayers and [has] cost the United States Treasury billions of dollars. SIRF can result in delayed refunds for taxpayers and additional operating costs for the IRS. Once the fraud is discovered, victims must go through a daunting administrative process to prove their identities and rectify their situations.</p><p>The IRS recognizes the threat posed by SIRF, and has implemented advanced <a href="https://www.irs.gov/newsroom/new-identity-verification-process-to-access-certain-irs-online-tools-and-services">verification</a> measures, <a href="https://www.irs.gov/newsroom/taxpayer-guide-to-identity-theft">encouraged</a> taxpayers to safeguard their personal information and <a href="https://www.irs.gov/faqs/irs-procedures/reporting-identity-theft">report</a> suspicious activity, and even established a dedicated <a href="https://www.irs.gov/individuals/how-irs-id-theft-victim-assistance-works">program</a> to assist taxpayers affected by identity theft. The IRS also issues Identity Protection PINs (<a href="https://www.irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin">IP PIN</a>s) to confirmed victims of tax-related identity theft, which are used to verify the taxpayers identity upon filing their tax return.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/irs_cyberattack_highlights_risk_of_tax_refund_fraud_47e79779d1.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[On Ukraine, China Prioritizes Its International Ambitions]]></title>
            <link>https://www.recordedfuture.com/on-ukraine-china-prioritizes-international-ambitions</link>
            <guid>https://www.recordedfuture.com/on-ukraine-china-prioritizes-international-ambitions</guid>
            <pubDate>Wed, 08 Mar 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[New Insikt Group research evaluates China’s position on the war in Ukraine, including its international interests, and support for Russia.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2023-0308.pdf">click here</a> to download the report as a PDF.</em></p><p><em>This report evaluates Chinas position on the war in Ukraine and support for Russia, how this position and Beijings proposed form of peace relates to Chinas international interests, and whether China is likely to provide lethal aid to Russia. Information about the author, Devin Thorne, can be found at the end of the report.</em></p><h2 id="executive-summary">Executive Summary</h2><p>Recently renewed allegations that China is considering providing lethal aid to Russia contrast starkly with Beijings calls for peace and continued assertions that it is <a href="https://archive.ph/j3aDG">objective and just</a> regarding the war in Ukraine. Based on a review of Chinas perspective on the war and what its leaders likely hope to achieve, Insikt Group judges that relations between China and the United States and Europe will almost certainly remain at odds for the duration of the war. Although Chinas position suggests there are areas of potential collaboration on peace, Beijing is likely pursuing a strategy of using a peace settlement to shape how future international crises are addressed, which contains elements that are almost certainly unacceptable to the US and others.</p><p>Chinas leadership almost certainly supports Russia  politically, rhetorically, and by allowing trade in dual-use goods to continue  to further its own strategic agenda, specifically the preservation of an important partner in the creation of a more multilateral international system. Chinas leadership very likely wants a peaceful end to the war. However, Chinas leadership very likely does not support a peace deal that conforms to, and returns to the status quo of, the current international system as led by the US and legitimizes coercive Western measures used against Russia (namely, sanctions) that could be levied against China in the future (such as in a Taiwan scenario).</p><p>Despite its support for Russias position, it is unlikely that Chinas leadership will approve the export of lethal aid to Russia. Such a decision will likely be judged too costly in light of other goals, such as stabilizing relations with the US and Europe and avoiding sanctions. The decision to provide lethal aid likely hinges on whether Chinas leadership judges that, in the short-to-mid term, stable (if not good) relations with the US and Europe are necessary. Chinese Communist Party (CCP) General Secretary Xi Jinpings personal relationship with Russian president Vladimir Putin also has the potential to <a href="https://www.chinatalk.media/p/will-xi-arm-putin-has-a-cold-war">inform</a> how he weighs the available options. Chinas leadership has likely not yet made a decision to provide lethal aid, and as of this writing, has not (based on publicly available information) exported lethal aid to Russia. If Chinas leadership does decide to export lethal aid to Russia, the US and European response will very likely lead to a serious deterioration in relations with China for the foreseeable future.</p><h2 id="key-judgments">Key Judgments</h2><ul><li>Chinas leadership almost certainly supports Russia politically, rhetorically, and by allowing trade in dual-use goods to further its own strategic agenda. </li><li>Chinas leadership very likely seeks a peaceful solution to the war, but not at the expense of its vision for how the international order should address future crises.</li><li>It is unlikely that Chinas leadership will allow Chinese companies to provide to Russia what the US and Europe deem lethal aid.</li><li>If Chinas leadership decides to export lethal aid to Russia, the US and Europe will almost certainly impose consequences that would very likely lead to a serious deterioration in relations with China for the foreseeable future.</li></ul>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2023_0306_Blog_Intelligence_Report_Main_Feature_a568b8bc4d.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[2022 Annual Report]]></title>
            <link>https://www.recordedfuture.com/2022-annual-report</link>
            <guid>https://www.recordedfuture.com/2022-annual-report</guid>
            <pubDate>Thu, 02 Mar 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[New Insikt research analyzes cyber threat and geopolitical trends observed throughout 2022 and provides a comprehensive overview of the cyber threat landscape.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2023-0302.pdf">click here</a> to download the report as a PDF.</em></p><p><em>The annual report surveys the threat landscape of 2022, summarizing a year of intelligence produced by Recorded Futures threat research team, Insikt Group. We analyze global trends and evaluate significant cybersecurity events, geopolitical developments, vulnerability disclosures, and more, providing a broad, holistic view of the cyber threat landscape in 2022.</em></p><h2 id="executive-summary">Executive Summary</h2><p>The physical conflict in Ukraine, and the effects it has had on the cyber threat landscape throughout 2022, frames our discussion of significant cyber threat events and geopolitical trends that occurred in 2022 and underscores the increased convergence of the cyber and geopolitical threat landscape.</p><p>Before and throughout the physical invasion, Recorded Future has observed increased instances of distributed denial-of-service (DDoS) attacks, hacktivist activity, and the widespread deployment of wiper malware. And while Russias invasion of Ukraine dominated the discussion of kinetic and cyber-hybrid operations, threat actors affiliated with other prominent nation-states, specifically Iran, China, and North Korea, carried out cyberattacks throughout the year, informed by an era of heightened geopolitical tension, competition, and politically charged affiliations. </p><p>We also analyzed cyber threat events across the broader threat landscape, including those carried out by cybercriminal groups. While phishing campaigns and ransomware attacks continue to plague organizations across industries and geographies, Recorded Future identified a 600% increase in the number of credentials sold via information stealing malware between Q1 and Q4, a significant year-over-year increase in targeting of software frequently used in organizations supply chains, and a shift toward an increasingly managed service model as as-a-service offerings proliferated on dark web marketplaces and underground forums. Initial access brokers are increasingly active, likely due to the increased use of infostealer malware and the ability to monetize stolen data.</p><p>The effective use of infostealers often relies on the successful exploitation of vulnerabilities. Notable vulnerability-related trends in 2022 included ransomware and Chinese state-sponsored threat actors rapidly exploiting zero-day vulnerabilities, the ongoing exploitation of Log4Shell across all quarters in 2022, and the impact of Microsofts oscillation about the automatic disablement of macros.</p><p>Finally, ransomware remained an ever-present threat in 2022. While certain ransomware gangs disbanded, others were quick to assert their dominance and used their significant resources to undertake campaigns against organizations of all sizes across industries. Although ransomware payments decreased by about 60% between 2021 and 2022, likely due to increased guidance from governments to forgo making ransomware payments and increased due diligence on cybersecurity standards from insurance companies when underwriting policies for ransomware attacks, ransomware will continue to pose a major threat to organizations throughout 2023.</p><h2 id="key-takeaways">Key Takeaways</h2><ul><li>Self-proclaimed hacktivist activity, likely a mix of grassroots and state-sponsored activity, surged in the first half of the year, as threat actors groups carried out attacks based on their allegiance to either Russia or Ukraine. While the majority of this activity was limited to targeting organizations involved in the conflict or located in areas close to eastern Europe, some hacktivist activity involved organizations in other regions. </li><li>Spillover effects of the deployment of wiper malware and the hacktivist activity were the primary cyber threats to organizations not directly involved in the war in Ukraine. </li><li>North Korea will most likely continue to test ballistic missiles in 2023. US military buildup in the western Pacific and increased defense spending and preparedness measures in Japan are likely to be met with equivalent actions by China. </li><li>Diplomatic negotiations over the Joint Comprehensive Plan of Action (JCPOA; commonly referred to as the Iran nuclear deal) are unlikely to make any progress. Meanwhile, the Islamic Republic of Iran continues to enrich uranium in an effort to achieve a nuclear weapon. The Israeli government is likely to continue kinetic strikes on elements of the Islamic Revolutionary Guard Corps-Quds Force (IRGC-QF) operating in Syria while keeping its options open for strikes on nuclear facilities inside of Iran.</li><li>2022 was the year of as-a-service, as we identified the presence of new phishing-as-a-service (PaaS) offerings in the threat landscape, the continued success of the ransomware-as-a-service (RaaS) model, and the development and use of new strains of malware-as-a-service (MaaS) offerings.</li><li>Open source or proprietary software packages were targeted throughout 2022. Given their effectiveness over the past year, these types of attacks will likely grow in severity in 2023. </li><li>Infostealers were increasingly used by threat actors, and the increased advertisement of authentication information collected by infostealers poses a risk to multi-factor authentication (MFA) security solutions. </li><li>While the adoption of countermeasures such as the disablement of macros by default has been highly effective, many threat actors have also pivoted their operations to subvert newly developed or implemented security protections, underscoring the need for a implementation of a defense-in-depth security strategy.</li><li>The exploitation of widely used products, as well as continued exploitation of previously reported vulnerabilities like Log4Shell, underscores threat actors ongoing focus on attack vectors that can be used for extended periods of time.</li><li>The volume of ransomware attacks is unlikely to shrink in 2023. However, if the finance gain from ransomware attacks continues to decrease, as observed from 2021 to 2022, threat actors are likely to adjust their tactics to continue realizing the historical financial incentives for ransomware attacks.</li></ul>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2022_annual_report_333c48e442.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Russia’s War Against Ukraine Disrupts the Cybercriminal Ecosystem]]></title>
            <link>https://www.recordedfuture.com/russias-war-against-ukraine-disrupts-cybercriminal-ecosystem</link>
            <guid>https://www.recordedfuture.com/russias-war-against-ukraine-disrupts-cybercriminal-ecosystem</guid>
            <pubDate>Fri, 24 Feb 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[New Insikt Research examines how Russia’s war against Ukraine has disrupted the cybercriminal ecosystem and ignited a resurgence of “crowdsourced hacktivism.”]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0223.pdf">click here</a> to download the report as a PDF.</em></p><h2 id="executive-summary">Executive Summary</h2><p>Russias war against Ukraine has disrupted the cybercriminal ecosystem. On February 24, 2022, Russia <a href="https://apnews.com/article/russia-ukraine-joe-biden-business-europe-moscow-e88497e7e8d4ad178057b599cc9ec8f6">launched</a> a full-scale invasion against Ukraine. As outlined in the recent Recorded Future report <a href="https://www.recordedfuture.com/themes-failures-russias-war-against-ukraine">Themes and Failures of Russias War Against Ukraine</a>, Russia likely remains intent on <a href="https://www.businessinsider.com/vladimir-putin-russian-forces-could-take-kyiv-ukraine-two-days-2022-3">seizing</a> Kyiv, <a href="https://www.gov.uk/government/news/kremlin-plan-to-install-pro-russian-leadership-in-ukraine-exposed">dismantling</a> the government of Ukraine, and <a href="https://www.usip.org/publications/2022/07/russias-ukraine-war-has-narrowed-not-its-goals">securing</a> a decisive military victory despite compounding strategic and tactical failures. Russias <a href="https://carnegieendowment.org/2022/12/19/what-russian-invasion-reveals-about-future-of-cyber-warfare-pub-88667">offensive cyber operations</a> have been unable to substantively augment Russias conventional military progress and will likely shift to targeting civilian infrastructure in an attempt to degrade Ukraines morale ahead of an upcoming, <a href="https://www.bbc.co.uk/news/world-europe-64492938">renewed</a> offensive. Russias continued reliance on leveraging proxy groups to achieve its objectives in Ukraine while maintaining plausible deniability has further illuminated the links between Russian Intelligence Services (RIS) and non-state actors, evidenced by Russias direct, indirect, and tacit relationships with cybercriminal and hacktivist groups as outlined in our report, <a href="https://www.recordedfuture.com/dark-covenant-2-cybercrime-russian-state-war-ukraine">Dark Covenant 2.0: Cybercrime, the Russian State, and the War in Ukraine</a>. </p><p>The so-called brotherhood of <a href="https://link.springer.com/chapter/10.1057/9781137021946_3">Russian-speaking threat actors</a> located in the Commonwealth of Independent States (CIS) has been damaged as a result of political disagreements among threat actors in the context of the war. This damage has established a new norm of internal instability, as evidenced by a <a href="https://www.reuters.com/technology/russian-ransomware-attacks-ukraine-muted-by-leaks-insurance-woes-2022-03-01/">continued wave</a> of insider leaks. Additionally, as Russia experiences a <a href="https://apnews.com/article/russia-ukraine-putin-immigration-kazakhstan-technology-c041eb0b7472668087bb94207de2f71d">brain drain</a> of IT professionals, these now-fracturing organized cybercriminal cartels will likely become more geographically decentralized, in turn making their relationships more diffuse. </p><p>The resurgence of <a href="https://www.businessinsider.com/ukraine-hacktivists-cause-harm-russia-cisco-experts-warn-it-army-2022-3">crowdsourced hacktivism</a>, an international phenomenon previously limited to the late 2000s, will likely create a new generation of non-state threat actors who are both politically and financially motivated. These so-called hacktivist groups, while their impact has been limited, have become <a href="https://www.washingtonpost.com/business/how-hacktivists-are-fighting-russia-with-their-keyboards/2022/03/04/6a9e0d2a-9b95-11ec-9987-9dceee62a3f6_story.html">symbolic</a> in the publics perception of the <a href="https://www.msspalert.com/cybersecurity-news/russia-linked-hackers-launch-ddos-attack-on-germany-threaten-canada-for-ukraine-artillery/">cyberwar</a> raging parallel to the war in Ukraine. </p><p>The economic consequences of the war in Ukraine are likely creating conditions conducive to an <a href="https://www.recordedfuture.com/russian-invasion-of-ukraine-and-sanctions-portend-rise-in-card-fraud">increase</a> in the value of payment card fraud on the dark web, despite an overall slump in carding volume <a href="https://www.recordedfuture.com/annual-payment-fraud-intelligence-report-2022">in 2022</a>. Regardless of frauds reputation as an unsophisticated form of cybercrime, it is likely becoming less a crime of opportunity than of survival. International arrests, seizures, and disruptive actions have destabilized the business model associated with commodified cybercrime, leading to wide-ranging and rippling effects on the malware- and ransomware-as-a-service (MaaS, RaaS) threat landscapes. These disruptions have also spread to the dark web shop and marketplace ecosystems, leading to price fluctuations and newfound competition among market administrators. Cybercrime, both based in the CIS and globally, is entering into a new era of volatility as a result of Russias war against Ukraine.</p><h2 id="key-takeaways">Key Takeaways</h2><ul><li>We did not identify any direct links between credential leaks preceding Russias war against Ukraine; however, we believe that these credential leaks could have been leveraged by threat actors seeking to exploit geopolitical tensions prior to the war. We also note that some of the database breaches we identified have since been attributed to nation-state actors.</li><li>The so-called brotherhood of Russian-speaking threat actors located in the CIS has been damaged by insider leaks and group splintering, due to declarations of nation-state allegiance both in support of and opposed to Russias war against Ukraine.</li><li>Russia is experiencing a wave of IT brain drain that will likely decentralize the organized cybercriminal threat landscape. In addition to brain drain, waves of military mobilization of Russias citizens are resulting in decreased activity on Russian-language dark web and special-access forums.</li><li>The resurgence of crowdsourced hacktivism will likely create a new generation of non-state threat actors. The impact of hacktivism has been limited, but its role in enabling information operations (IOs) remains vital. Hacktivism has become symbolic in the publics perception of the cyberwar raging parallel to Russias war against Ukraine.</li><li>Russian law enforcements seizure and closure of several top-tier carding shops in January and February 2022 severely disrupted the payment card fraud ecosystem until April 2022. Since May 2022, the emergence of new carding shops has driven a partial rebound in the volume of compromised card-not-present (CNP) data posted for sale on the dark web.</li><li>International arrests, seizures, and disruptive actions have destabilized the business model associated with commodified cybercrime. </li><li>Russias war against Ukraine has disrupted the dark web shop and marketplace ecosystems. International supply-chain disruptions and border closures have made the shipping of physical contraband impractical for Russia-based threat actors.</li></ul><h2 id="background">Background</h2><p>On February 24, 2022, Russia <a href="https://www.reuters.com/markets/europe/leaders-key-quotes-after-russia-invades-ukraine-2022-02-24/">began</a> a full-scale invasion of Ukraine that was supported by ground and aerial bombardment, surface-to-surface and surface-to-air missiles, cyberattacks, electronic warfare, information warfare, and more. Almost immediately, the Russian cybercriminal underground reacted with <a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-110a">declarations of allegiance</a> from forum administrators, threat actors, and threat actor organizations. Hacktivist campaigns, coordinated distributed denial-of-service (DDoS) attacks, doxxing activities, trolling, website defacement, ransomware infections, and more began within hours of the invasion.</p><p>While the vast majority of non-state cybercriminal and hacktivist activities in the early days of Russias war against Ukraine targeted Russian and Belarusian entities in retaliation for the invasion, opportunistic threat actors sought to exploit the tensions by leveraging vulnerabilities in the cyber infrastructure of Russian, Belarusian, and Ukrainian entities and selling leaked information or unauthorized access for financial gain and publicity. Declarations of allegiance also prompted internal unrest within certain threat actor organizations, leading to hostile activities and schisms between threat actors. </p><p>Since February 24, 2022, we have been actively monitoring the daily activities of cybercriminal and non-state hacktivist entities that have been involved directly or indirectly in the Russian war against Ukraine.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2023_0222_Blog_Russia_s_War_Against_Ukraine_Main_Feature_d45b0851f0.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[In Before The Lock: ESXi]]></title>
            <link>https://www.recordedfuture.com/in-before-the-lock-esxi</link>
            <guid>https://www.recordedfuture.com/in-before-the-lock-esxi</guid>
            <pubDate>Mon, 13 Feb 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group examines a 3-fold increase in ransomware targeting ESXi, with offerings available from many groups, including ALPHV, LockBit, and BlackBasta.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0213.pdf">click here</a> to download the report as a PDF.</em></p><h2 id="executive-summary">Executive Summary</h2><p>As organizations continue virtualizing their critical infrastructure and business systems, threat actors deploying ransomware have responded in kind. Between 2021 and 2022 we observed an approximately 3-fold increase in ransomware targeting <a href="https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html">ESXi</a>, with offerings available from many groups including ALPHV, LockBit, and BlackBasta. We identified and described detection strategies for multiple TTPs that are often seen prior to the dropping of the ransomware payload in order to create detections and mitigations that are based on real-world, threat-actor use of these tools. In addition to providing tool-specific detections such as YARA and Sigma rules, we also identified detections for common enumeration, exploitation, and persistence techniques. The detections and mitigations provided can be used not only for the tools assessed below but also for custom (threat actor-specific) tools that are outside the scope of this report. Organizations looking to threat hunt, detect, and mitigate pre-ransomware TTPs for ESXi systems should use the detections provided as a starting point to develop detections specific to their environment and as part of a layered security approach. The infancy of defensive products such as endpoint detection and response (EDR) or antivirus software (AV) currently available for ESXi, combined with organizations increased reliance on virtualization, creates an attractive target for threat actors and can potentially lead to operational downtime and reputational damage to an organization.</p><h2 id="key-takeaways">Key Takeaways</h2><ul><li>Ransomware targeting ESXi will continue to be a threat to organizations, putting them at risk of operational downtime, competitive disadvantage, and damage to their brand. </li><li>Organizations should continue to deploy virtualized infrastructure, but it is critical to implement security best practices and similar precautions as used in existing infrastructure.</li><li>The malicious tools targeting ESXi primarily abuse native commands to perform their actions, making them difficult to differentiate from normal system administrator activity.</li><li>Openly available tools and device search engines will continue to be used by threat actors targeting ESXi, in addition to custom tooling.</li><li>The immaturity of antivirus and EDR solutions that cover ESXi, coupled with the difficulty of implementing security measures, lowers the technical barrier for threat actors deploying malware on ESXi compared with those targeting Windows.</li><li>Exploiting vulnerabilities for initial access is a common tactic; however, many threat actors simply rely on system administrator notes, stored passwords, or keylogging specific employees to gain access to a vSphere environment.</li><li>Defensive practices are difficult to implement due to the complex nature of hypervisors; however, implementing utilities that provide host attestation, reduce the attack surface, and minimize access to other systems on the network can greatly reduce risk for organizations.</li></ul><h2 id="background">Background</h2><p>Ransomware groups continue to evolve and expand their toolsets, focusing on more specialized targets and creating more refined tooling based on opportunities to make money. VMware ESXi is the market-leading, enterprise-grade hypervisor designed for deploying and serving virtual infrastructure. ESXi-targeting ransomware will continue to present a threat to organizations that are shifting towards virtualizing the majority of their server infrastructure. The practice of securing virtualized infrastructure is complicated due to the proprietary nature of the technology and the relative infancy of defensive products designed for it. As a result of these factors, ESXi presents an exceptionally attractive target for financially motivated threat actors.</p><p>In 2020, there were very few mentions of ESXi ransomware attacks, as threat actors primarily targeted Windows-based networks due to the availability of initial access presented by the pandemic and multiple critical vulnerabilities (such as CVE-2018-13379, CVE-2019-11510, and CVE-2019-19781). As organizations responded with more effective defenses against ransomware and threat actors recognized the defensive gaps in virtualized networks, threat actors began to create ESXi-specific ransomware and techniques. In 2021, cyberattacks involving ESXi ransomware increased. During 2022, we observed a 3-fold year-over-year increase in ransomware attacks by a larger number of ransomware groups and advanced TTPs and tooling targeting virtualized infrastructure, as seen in Figure 1 below.</p><p><img src="https://cms.recordedfuture.com/uploads/esxi_001_ae27d0ad3c.png" alt="esxi-001.png"><em><strong>Figure 1:</strong> Ransomware attacks focused on ESXi show a 3-fold increase in a single year (Source: Recorded Future)</em></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0213.pdf">click here</a> to download the report as a PDF.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2023_0210_Blog_In_Before_the_Lock_ES_Xi_Featured_Image_c37667921b.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Themes and Failures of Russia’s War Against Ukraine]]></title>
            <link>https://www.recordedfuture.com/themes-failures-russias-war-against-ukraine</link>
            <guid>https://www.recordedfuture.com/themes-failures-russias-war-against-ukraine</guid>
            <pubDate>Thu, 09 Feb 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group examines Russia’s hybrid warfare themes over the past year, illuminating its strategic miscalculations and strategies to overcome its shortfalls.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2023-0209.pdf">click here</a> to download the report as a PDF.</em></p><h2 id="executive-summary">Executive Summary</h2><p>A year after Russia launched its full-scale invasion of Ukraine, Russia remains unsuccessful in bringing Ukraine under its control as it struggles to overcome months of compounding strategic and tactical failures. Despite these challenges, the Kremlins intent remains unchanged, leaving Ukraine and the international community at heightened risk. In anticipation of Russias <a href="https://www.bbc.co.uk/news/world-europe-64492938">planned</a> renewed offensive, this report reflects on Russias key hybrid warfare themes over the past year, including military failures, exploitation of natural resources, reliance on proxy groups, and partnerships with anti-Western allies. By doing so, this report illuminates the Kremlins strategic miscalculations and its strategies for overcoming its shortfalls.</p><p>In the near term, Russia will very likely launch a renewed offensive in Ukraine with a likely focus on the Donbas. Russian state-sponsored cyber threat actors, as well as pro-Russian cybercriminals and hacktivists, will almost certainly support this campaign through continued <a href="https://www.theguardian.com/world/2022/oct/31/russian-missiles-kyiv-ukraine-cities">targeting</a> of Ukrainian critical infrastructure, at least in part in an attempt to further degrade Ukraines morale and will to fight. Meanwhile, Russia will also have to manage the direction of largely <a href="https://www.nytimes.com/2022/10/16/world/europe/russia-draft-ukraine.html">untrained troops</a> and modern <a href="https://www.newsweek.com/russia-resorting-soviet-era-anti-aircraft-missiles-hit-land-targets-1723247">weapons shortages</a>, with likely reliance on recently mobilized troops, proxy organizations like Wagner, and foreign weapon supplies from Iran and North Korea to augment its capabilities.</p><p>In the longer term, Russias actions over the past year have caused lasting geopolitical shifts far beyond Ukraine. In particular, the <a href="https://www.defense.gov/News/News-Stories/Article/Article/3157239/ukraines-success-was-a-surprise-only-to-the-russians/">success</a> of Ukraines collective defense model resonates globally, and European <a href="https://features.csis.org/us-lng-remapping-energy-security/">shifts</a> away from reliance on Russian gas, serve to remind the international community about the benefits of allied cooperation and the importance of global partnerships. These partnerships are further supported by Russias burgeoning military cooperation with <a href="https://www.defense.gov/News/News-Stories/Article/Article/3206808/russias-reliance-on-iran-sign-of-putins-isolation/">Iran</a> and <a href="https://www.nknews.org/2023/01/new-photos-show-north-korea-sent-weapons-to-russian-paramilitary-group-pentagon/">North Korea</a>, which creates a heightened global threat environment. As the war stretches on, the risk of Belaruss involvement, escalation in the conflict, degraded Ukrainian morale, and international complacency compound, further threatening the security of both Ukraine and the international community.</p><h2 id="key-judgments">Key Judgments</h2><ul><li>Russia was almost certainly challenged by Ukraines cyber defenses, which were bolstered by its allies and industry partners, rendering cyber operations unable to substantively augment Russias conventional military progress and demonstrating the importance of collective defense. </li><li>Russias persistent kinetic and cyber targeting of Ukraines civilians and critical infrastructure throughout winter very likely reflects the Kremlins intent to degrade Ukraines morale ahead of an upcoming, renewed offensive.</li><li>Russias persistent use of proxy groups throughout the conflict, such as Wagner Group and pro-Russian cybercriminals, hacktivists, and influence actors, has revealed Kremlin control or direction over these groups, while further illuminating Russias desire to have plausible deniability over its actions.</li><li>Russia has strengthened international partnerships with key anti-Western allies, including Iran and North Korea, who are likely to continue providing material support to Russia for its war against Ukraine and pose increasing threats to the West as their military cooperation expands.</li><li>Russias leveraging of its natural resources over the past year has pushed the West to find alternative fuel sources, which will very likely decrease Russias ability to exert pressure over the international community.</li><li>While Russia maintains its intent to bring Ukraine under its control, the numerous, unaddressed challenges its military faced during the initial invasion, in addition to largely untrained troops, weapons shortages, and Ukraines military being armed by the West, will very likely challenge future Russian successes on the battlefield.</li><li>As the war continues, a variety of risks threaten both Ukraine and the international community, including formal Belarusian involvement, the potential for escalation, degraded Ukrainian morale, and international complacency.</li></ul>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/themes_failures_russias_war_against_ukraine_0958791dab.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[New “Crypto Drainer” Phishing Pages Siphon Cryptocurrency in Seconds]]></title>
            <link>https://www.recordedfuture.com/new-crypto-drainer-phishing-pages-siphon-cryptocurrency-seconds</link>
            <guid>https://www.recordedfuture.com/new-crypto-drainer-phishing-pages-siphon-cryptocurrency-seconds</guid>
            <pubDate>Thu, 02 Feb 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group examines how ready-to-go “crypto drainers” are deployed with legitimate services on phishing pages to siphon crypto assets from crypto wallets.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0202.pdf">click here</a> to download the report as a PDF.</em></p><h2 id="executive-summary">Executive Summary</h2><p>A Nigerian prince needs your help. Or a coworker texts you, urgently demanding that you send gift cards. Words like fraud and phishing often evoke simple scams that only fool the foolish. In reality, threat actors develop refined tactics, techniques, and procedures (TTPs) to target users who believe themselves too clever to be fooled.</p><p>Crypto drainers are malicious scripts that function like e-skimmers and are deployed with phishing techniques to steal victims crypto assets. The phishing pages that are deployed with crypto drainers often imitate popular crypto services and use common third-party applications and extensions (such as MetaMask) that are not unusual for the legitimate services that these phishing pages imitate.</p><p>We discovered a ready-to-go crypto drainer phishing page advertised by a threat actor on a top-tier dark web forum. This phishing page purports to mint non-fungible tokens (NFTs) and uses third-party services that are commonly used in the crypto sphere. After analyzing this crypto drainer, we concluded that it can be effectively used to steal crypto assets from compromised crypto wallets. Once crypto wallets are compromised, no safeguards exist to prevent the theft of crypto assets. Since their first appearance in 2022, crypto drainer phishing pages have surged in popularity, and crypto drainer phishing pages will likely remain relevant, effective, and widely used in 2023.</p><h2 id="key-judgments">Key Judgments</h2><ul><li>Crypto drainers are used on phishing pages that imitate popular crypto services to steal crypto assets from unsuspecting victims. They exploit legitimate extensions and applications that are frequently used with the crypto services that the phishing pages imitate.</li><li>We analyzed a ready-to-go crypto drainer phishing page advertised by a threat actor on a top-tier dark web forum. This phishing page entices victims into connecting their wallets with an offer to mint NFTs. As soon as victims attempt to mint NFTs, the crypto drainer siphons available cryptocurrency and desired NFTs to the attackers wallet.</li><li>Crypto drainer projects are surging in popularity, and a growing number of ready-to-go crypto drainer phishing packages could allow threat actors to execute them quickly and at scale.</li></ul><h2 id="background">Background</h2><p>Though blockchain technology is designed from the ground up with security in mind, openings nevertheless exist for threat actors to defraud victims of their crypto assets. Crypto drainers are malicious files that function similarly to e-skimmers by automatically executing transfers of crypto assets.</p><p>Crypto drainers are commonly deployed on phishing pages that imitate popular crypto services. Examples of the crypto services that a crypto drainer phishing page might imitate include cryptocurrency exchanges or non-fungible token (NFT) platforms. Importantly, crypto drainer phishing pages often use third-party services or extensions (such as MetaMask) that are commonly used with the crypto services they imitate. The use of legitimate services on crypto drainer phishing pages may increase the likelihood that the phishing page will pass an otherwise savvy users scam litmus test.</p><p><img src="https://cms.recordedfuture.com/uploads/Crypto_Drainer_Phishing_001_0932f9f2c6.png" alt="Crypto-Drainer-Phishing-001.png"><em><strong>Figure 1:</strong> Recorded Future analyzed a crypto drainer phishing page that entices victims to connect their wallets with the promise of minting NFTs (Source: Recorded Future)</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2023_0202_Blog_Intelligence_Report_Featured_Image_af9714f822.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Dark Covenant 2.0: Cybercrime, the Russian State, and the War in Ukraine]]></title>
            <link>https://www.recordedfuture.com/dark-covenant-2-cybercrime-russian-state-war-ukraine</link>
            <guid>https://www.recordedfuture.com/dark-covenant-2-cybercrime-russian-state-war-ukraine</guid>
            <pubDate>Tue, 31 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[This report examines the unspoken connections between the Russian Federation, cybercriminals, and self-described hacktivists in Russia and Eastern Europe in the context of the Russian war in Ukraine.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0131.pdf">click here</a> to download the report as a PDF.</em></p><p>This report examines the unspoken connections between the Russian Federation, cybercriminals, and self-described hacktivists in Russia and Eastern Europe in the context of the Russian war in Ukraine. It is a direct continuation of the findings presented in our 2021 report Dark Covenant: Connections Between the Russian State and Criminal Actors. This report will be of interest to threat researchers, as well as law enforcement, government, and defense organizations.</p><h2 id="executive-summary">Executive Summary</h2><p>Beginning on February 24, 2022, the Russian cybercriminal threat landscape underwent transformative changes in response to the Russian war in Ukraine. The war brought chaos to the cybercriminal underground, polarizing threat actors in Commonwealth of Independent States (CIS) nations. While some cybercriminal groups declared allegiance to the Russian government, others splintered over irreconcilable ideological differences or remained apolitical, opting to capitalize on geopolitical instability for financial gain. Some groups vanished entirely. Likely as indirect consequences of the war, there have been underground market disruptions, shifts in hacktivist and ransomware targeting, and a spike in financial fraud, among other phenomena affecting the Russian cybercriminal ecosystem.</p><p>Throughout these changes, one thing remained largely constant: cybercriminal threat groups continue to occupy important <a href="https://www.recordedfuture.com/russian-state-connections-criminal-actors">roles</a>  in direct, indirect, and tacit capacities  with the Russian government. For cybercrime groups who have pledged their allegiance to the Kremlin, the unspoken connections have deepened. Russian cybercriminals and self-described hacktivists are actively involved in operations targeting Ukrainian entities and infrastructure, as well as entities located in states that have declared their support for Ukraine. Recorded Future has observed Russian and Russian-speaking threat actors targeting the United States, United Kingdom, the North Atlantic Treaty Organization (NATO), Japan, and others for financial gain and ego-driven publicity in support of Russia.</p><p><img src="https://cms.recordedfuture.com/uploads/dark_covenant_2_cybercrime_russian_state_war_ukraine_001_6cb4eacdd1.jpg" alt="dark-covenant-2-cybercrime-russian-state-war-ukraine-001.jpg"><em><strong>Figure 1</strong>: Conti Gang statement dated February 25, 2022, in which the group allies itself with the Russian government (Source: Conti.News)</em></p><p>Cybercriminal organizations like Conti have overtly declared allegiance to the Russian government, and commodity malware like DarkCrystal RAT, Colibri Loader, and WarZoneRAT, which are available on top-tier Russian-language forums, are being used by advanced persistent threat (APT) groups to target entities in Ukraine. We have identified cybercriminal activities preceding the war, and immediately after it started, that we believe are the work of the Russian state. Russian-speaking, self-described hacktivist groups like Killnet and Xaknet are almost certainly actively engaging in information operations (IOs) against organizations and entities in the West, enabled by Russian state-sponsored media with the likely intended goal of stoking fear or decreasing support for Ukraine. We have also identified other phenomena, such as a rise in payment card fraud, database leaks, dark web marketplace closures, and more, that we believe are the consequences of economic, diplomatic, and law enforcement activities aimed at Russian entities due to their support for the war in Ukraine.</p><h2 id="key-judgments">Key Judgments</h2><ul><li>It remains highly likely that Russian intelligence, military, and law enforcement services have a longstanding, tacit understanding with cybercriminal threat actors; in some cases, it is almost certain that these agencies maintain an established and systematic relationship with cybercriminal threat actors, either by indirect collaboration or via recruitment. </li><li>Based on our understanding of cybercriminal and hacktivist activities related to the Russian war in Ukraine, it is likely that cybercriminal threat actors are working alongside the Russian state to coordinate or amplify Russian offensive cyber and information operations.</li><li>Russian cybercriminal groups, tools, and tactics, techniques, and procedures (TTPs) likely serve to provide plausible deniability for state-sponsored threat actors involved in the Russian war in Ukraine. It is likely that financially motivated threat actors who are capitalizing on geopolitical instability are also aiding and abetting the interests of the Russian state, be it coincidentally or intentionally.</li><li>Russian law enforcement seizures of dark web and special-access sources preceding the war appeared to be a show of good faith by the Russian state, signaling its willingness and ability to thwart cybercrime. However, we believe it is likely that these enforcement actions were intended to undermine allegations of cooperation between cybercriminals and the Russian state, providing further plausible deniability.</li><li>Several cybercriminal industries have undergone transformational changes as a result of the Russian war in Ukraine. These include changes to the malware-as-a-service (MaaS) and ransomware-as-a-service (RaaS) threat landscapes, a rise in Russian payment card fraud, shifts in cybercriminal targeting, changes in infrastructure and hosting, and more.</li></ul><h2 id="methodology">Methodology</h2><p>This report synthesizes information derived from open and human sources, including information gathered from monitoring of, and engagement on, dark web, special-access, and social media sources frequented by Russian-speaking cybercriminals. We looked at several English-language forums to cross-reference points of contact and link monikers suspected to be operated by Russian-speaking cybercriminals across the dark web. We also gathered intelligence from open and closed-source messaging platforms, such as Telegram, Tox, and Jabber (XMPP), as well as social media. </p><p>Our collections on ransomware extortion, chat, and payment websites helped us connect various ransomware groups with the Russian state. We used qualitative and quantitative methods to study ransomware victimology before and after the Russian invasion of Ukraine on February 24, 2022, to theorize about motives and ideology. This report relies heavily on the use of the Recorded Future Platform to visualize its findings and draw connections between geopolitical events, cybercriminal threat actors and threat actor groups, advanced persistent threats (APTs), and the Russian state in the context of the Russian war in Ukraine.</p><p>We also rely heavily on other forms of OSINT research, such as academic publications, industry white papers, conference presentations, and more, to fill in gaps in our HUMINT collections process. This report uses previous open-source reporting, as well as the original 2021 <a href="https://www.recordedfuture.com/russian-state-connections-criminal-actors">Dark Covenant</a> report, as the background and warrant for its research. This report was researched and written between February 24, 2022 and August 24, 2022.</p><p><img src="https://cms.recordedfuture.com/uploads/dark_covenant_2_cybercrime_russian_state_war_ukraine_002_8addf2b8cf.png" alt="dark-covenant-2-cybercrime-russian-state-war-ukraine-002.png"><em><strong>Figure 2</strong>: Timeline of events between the cybercriminal ecosystem, self-described hacktivist entities, and state-sponsored groups during the conflict in Ukraine (Source: Recorded Future)</em></p><h2 id="background">Background</h2><h3 id="dark-covenant">Dark Covenant</h3><p>In 2021, we <a href="https://www.recordedfuture.com/russian-state-connections-criminal-actors">detailed</a> how established, distributed networks of individuals in the Russian cybercriminal world and officials in Russian law enforcement or intelligence services  also known colloquially as siloviki  are connected. The report detailed how the relationships in this ecosystem are often premised on unspoken, yet understood, agreements that consist of malleable associations. This research was based on historical activity, public indictments, and ransomware attacks. Overall, the report broke down the associations between the Russian cybercriminal environment and the siloviki into 3 major categories: direct associations, indirect affiliations, and tacit agreements. </p><ul><li>Direct associations are identified by precise links between state institutions and criminal underground operators; an example of this is Dmitry Dokuchaev, a major in the Russian Federal Security Service (FSB) who was recruited after working as a cybercriminal.</li><li>Indirect affiliations occur in cases where a direct link cannot be established but there are clear indications that the Russian government is using resources or personnel for its benefit; an example of this is the Russian governments likely use of the GameOver Zeus botnet for <a href="https://www.blackhat.com/docs/us-15/materials/us-15-Peterson-GameOver-Zeus-Badguys-And-Backends.pdf">espionage</a> or DDoS attacks by patriotic hackers during military conflicts. </li><li>Tacit agreement is defined as overlaps in cybercriminal activity, including targeting and timing, that benefit Russian state interests or strategic goals; such activity is conducted without direct or indirect links to the state but is allowed by the Kremlin, which looks the other way when such activity is conducted.</li></ul><p>In our 2021 report, we assessed that cybercriminal associations with the siloviki would almost certainly continue for the foreseeable future and these associations and activities would likely adapt to provide greater plausible deniability and fewer overt, direct links between both groups. </p><p>Since our first report, the Russian government has invaded Ukraine, an event that has illuminated our understanding of Russias capabilities and shortcomings as they relate to military strength and cyber capacity. For example, a series of leaks about the cybercriminal groups Conti and Trickbot (Wizard Spider) provided an unprecedented look at the relationship between these groups and the state. The conflict has given rise to self-described hacktivists conducting pro-Russian attacks purportedly motivated by patriotic interest; in some cases, however, it is <a href="https://www.mandiant.com/resources/blog/gru-rise-telegram-minions">likely</a> that such groups are providing the Russian government with plausible deniability.</p><h3 id="the-russian-invasion-of-ukraine">The Russian Invasion of Ukraine</h3><p>The February 2022 Russian invasion of Ukraine has resulted in a broader humanitarian crisis in Europe as well as heightened international tensions. A number of pro-Russian threat actor groups, as well as some previously unseen entities from within the cybercriminal ecosystem, have participated in the conflict, which Russia has conducted across the physical, information, and cyber domains. The war has already seen large-scale distributed denial-of-service attacks (DDoS), website defacements, phishing and spam campaigns, malware deployment, and wiper attacks against numerous Ukrainian entities in both the government and private sector. </p><h3 id="russian-cybercrime-in-cyber-warfare">Russian Cybercrime in Cyber Warfare</h3><p>The Russian intelligence services recruitment of highly skilled computer programmers, network specialists, and other technologically savvy personnel dates back to at least the 1990s, according to a <a href="https://meduza.io/en/feature/2019/12/12/the-fsb-s-personal-hackers">Meduza</a> report published on December 12, 2019. In this report, an FSB officer is quoted as suggesting that as soon as hackers achieve a certain level of success, they are targeted for recruitment: In [the FSB officers] words, as soon as the first technical college student from a humble background brought a Ferrari out onto the streets of Moscow, FSB agents started recruiting  both getting the cybercrime business under control and making it their own.</p><p>In his 2019 <a href="https://www.worldcat.org/title/vtorenie-kratkaja-istorija-russkich-chakerov/oclc/1125189608">book</a> Intrusion: A Brief History of Russian Hackers, Daniil Turovsky quoted an unnamed Russian hacker who provided an account of the associations between the criminal underground and the Russian intelligence services. According to the hacker, the Center for Information Security at the Russian Federal Security Service (CIB FSB) had limited technical staff, so it often brought in outside specialists, reportedly going so far as to hide some hackers in safe houses. </p><p>Andrei Soldatov, a Russian investigative journalist and co-author of The Red Web, a book about the Kremlins online activities, <a href="https://www.buzzfeednews.com/article/sheerafrenkel/inside-the-hunt-for-russias-hackers">said</a> that while the Russian governments tactic of outsourcing cyber operations to various groups helps distance themselves (and ultimately provides deniability), it also left them vulnerable to hackers running amok.</p><h3 id="russian-cybercrime-in-foreign-policy">Russian Cybercrime in Foreign Policy</h3><p>In September 2021, around the time we released our initial Dark Covenant report, we identified a shift in calculus following recent high-profile ransomware attacks and subsequent intergovernmental consultations between the US and Russia. At the time, high-profile ransomware attacks against <a href="https://therecord.media/fbi-colonial-pipeline-was-hit-with-darkside-ransomware/">Colonial Pipeline</a>, <a href="https://therecord.media/fbi-jbs-ransomware-attack-was-carried-out-by-revil/">JBS</a>, and <a href="https://therecord.media/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update/">Kaseya</a> led the US to increase pressure on the Russian government to take action against the cybercriminal groups behind this activity. Around this time, the administrators of 2 major Russian-language forums, Exploit and XSS, quickly banned ransomware topics on their criminal underground platforms, likely as a result of the increased pressure. However, ransomware activities persist in the form of <a href="https://support.recordedfuture.com/hc/en-us/articles/7187714543763-Initial-Access-Brokers-Are-Key-to-Rise-in-Ransomware-Attacks">initial access</a> and data leak brokerage services. Moreover, the DarkSide, REvil, and Avaddon ransomware families halted extortionist activities right before or days after the first <a href="https://www.usatoday.com/story/news/politics/2021/06/16/joe-biden-set-putin-summit-geneva-after-g-7-nato-meetings/7700426002/">meeting</a> between US president Joe Biden and Russian president Vladimir Putin on June 16, 2021, in Geneva, Switzerland. This pause was only temporary, as ransomware attacks continued in 2022, including attacks affecting critical infrastructure targets in the energy sector and transportation entities in Europe (<a href="https://www.zdnet.com/article/blackcat-ransomware-implicated-in-attack-on-german-oil-companies/">1</a>, <a href="https://www.bleepingcomputer.com/news/security/blackcat-alphv-claims-swissport-ransomware-attack-leaks-data/">2</a>, <a href="https://www.bloomberg.com/news/articles/2022-09-02/suspected-russian-ransomware-group-hacks-italian-energy-agency?leadSource=uverify%20wall">3</a>).</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/dark_covenant_2_cybercrime_russian_state_war_ukraine_f6961eaa01.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[BlueBravo Uses Ambassador Lure to Deploy GraphicalNeutrino Malware]]></title>
            <link>https://www.recordedfuture.com/bluebravo-uses-ambassador-lure-deploy-graphicalneutrino-malware</link>
            <guid>https://www.recordedfuture.com/bluebravo-uses-ambassador-lure-deploy-graphicalneutrino-malware</guid>
            <pubDate>Fri, 27 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future's Insikt Group examines new activity from the Russian threat actor group, BlueBravo, targeting countries with a nexus to the Ukraine crisis.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0127.pdf">click here</a> to download the report as a PDF.</em></p><h2 id="executive-summary">Executive Summary</h2><p>BlueBravo is a threat group tracked by Recorded Futures Insikt Group that overlaps with the Russian advanced persistent threat (APT) activity tracked as APT29 and NOBELIUM. APT29 and NOBELIUM operations have been <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/04/15/fact-sheet-imposing-costs-for-harmful-foreign-activities-by-the-russian-government/">previously</a> <a href="https://blogs.microsoft.com/on-the-issues/2021/10/24/new-activity-from-russian-actor-nobelium/">attributed</a> to Russias Foreign Intelligence Service (SVR), an organization responsible for foreign espionage, active measures, and electronic surveillance. In October 2022 we identified BlueBravo staging GraphicalNeutrino malware within a malicious ZIP file. The staging and deployment of this ZIP file overlaps with the previously employed dropper <a href="https://attack.mitre.org/software/S0634/">EnvyScout</a>, the use of which is linked to <a href="https://unit42.paloaltonetworks.com/cloaked-ursa-online-storage-services-campaigns/">APT29</a> and <a href="https://www.microsoft.com/en-us/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/">NOBELIUM</a>.</p><p>BlueBravo used a compromised website containing the text &quot;Ambassador`s schedule November 2022&quot; as part of a lure operation. Based on the theme of this lure, we suspect that the targets of this campaign are related to embassy staff or an ambassador. This targeting profile aligns with previous <a href="https://inquest.net/blog/2022/04/18/nobelium-israeli-embassy-maldoc">reporting</a> from InQuest in early 2022 that describes the group, reported as NOBELIUM, employing a lure document titled Ambassador_Absense.docx that displayed content relating to the Embassy of Israel. Following deployment and execution, InQuest reported that the malware, BEATDROP, employed trello[.]com for command-and-control (C2) in an attempt to evade detection and create challenges in attributing the activity.</p><p>Similar to the use of Trello for data exchange by BEATDROP, we have found that GraphicalNeutrino uses the United States (US)-based, business automation service Notion for its C2. The use of the Notion service by BlueBravo is a continuation of their previous tactics, techniques, and procedures (TTPs), as they have <a href="https://www.mandiant.com/resources/blog/tracking-apt29-phishing-campaigns">employed</a> multiple online services such as Trello, Firebase, and Dropbox in an attempt to evade detection. The abuse of legitimate services, such as those employed by BlueBravo, presents a complex issue for network defenders due to the difficulty of defending against malicious access to legitimate services. The use of this technique is becoming more common and will continue to pose a problem for network defenders.</p><p>GraphicalNeutrino acts as a loader with basic C2 functionality and implements numerous anti-analysis techniques including API unhooking, dynamically resolving APIs, string encryption, and sandbox evasion. It leverages Notions API for C2 communications and uses Notions database feature to store victim information and stage payloads for download.</p><p>While we are unable to assess the intended targets of this operation based on the data available, it is likely that ambassadorial or embassy-themed lures are particularly effective during periods of heightened geopolitical tensions, such as is the case with the ongoing war in Ukraine. During such periods, Russian APT groups are highly likely to make extensive use of diplomatically themed lures, as the information potentially gathered from the compromise of entities or individuals receiving such communications is likely to have a direct impact on Russias foreign policy and broader Russian strategic decision-making processes.</p><p>Based on historical APT29 and SVR <a href="https://blog-assets.f-secure.com/wp-content/uploads/2020/03/18122307/F-Secure_Dukes_Whitepaper.pdf">cyber</a> operations and active measures, we assess it is likely that additional countries at the nexus of the conflict are at risk of targeting. This targeting almost certainly represents an ongoing interest from threat actors affiliated with the SVR and aligns with their continued intent to gain access to strategic information from entities and organizations engaged in foreign policy. Any country with a nexus to the Ukraine crisis, particularly those with key geopolitical, economic, or military relationships with Russia or Ukraine, are at increased risk of targeting.</p><h2 id="key-judgments">Key Judgments</h2><ul><li>We have identified new malware used by BlueBravo, which overlaps with Russian APT activity tracked as APT29 and NOBELIUM, which Western governments and researchers have linked to the Russian Foreign Intelligence Service (SVR).</li><li>Identified staging infrastructure continues the trend of using compromised websites to deliver BlueBravo malware within archive files. The delivery of these files uses the same HTML smuggling technique as EnvyScout.</li><li>The malware also takes advantage of DLL search order hijacking for execution, helping to evade detection on the host.</li><li>A change to Notion as the initial C2 from Trello, Firebase, and Dropbox demonstrates BlueBravos broadening but continued use of legitimate Western services to blend their malware traffic to evade detection.</li><li>Though no second-stage malware, follow-on C2 server, or victims were identified, the initial lure page suggests BlueBravos targeting was related to unknown embassy staff or an ambassador.</li><li>Embassy-related information is likely considered high value intelligence, especially in the midst of the Russian war in Ukraine.</li></ul><h2 id="background">Background</h2><p>BlueBravos targeting, its tactics, techniques, and procedures (TTPs), and its targeting interests and operations overlap with Russian advanced persistent threat activity publicly reported as APT29 and NOBELIUM, which has been <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/04/15/fact-sheet-imposing-costs-for-harmful-foreign-activities-by-the-russian-government/">previously</a> <a href="https://blogs.microsoft.com/on-the-issues/2021/10/24/new-activity-from-russian-actor-nobelium/">attributed</a> to Russias Foreign Intelligence Service (SVR). The SVR is responsible for foreign espionage, active measures, and electronic surveillance. APT29 has been active since at <a href="https://blog.f-secure.com/podcast-dukes-apt29/">least</a> 2008 according to third-party reporting, engaging in espionage operations against entities associated with security and defense, politics, and research. APT29 was initially observed <a href="https://blog-assets.f-secure.com/wp-content/uploads/2020/03/18122307/F-Secure_Dukes_Whitepaper.pdf">surveilling</a> Chechen and dissident organizations but expanded to target entities in the West such as the <a href="https://thehill.com/policy/cybersecurity/250730-pentagon-restores-hacked-email-system">Pentagon</a> in 2015, the <a href="https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/">Democratic National Committee</a> (DNC) and US think tanks in 2016, and the Norwegian <a href="https://www.theguardian.com/technology/2017/feb/03/norway-accuses-group-linked-to-russia-of-carrying-out-cyber-attack">government</a> and <a href="https://www.volkskrant.nl/cultuur-media/russen-faalden-bij-hackpogingen-ambtenaren-op-nederlandse-ministeries~b77ff391/">several</a> Dutch ministries in 2017.</p><p>In 2021, public reporting detailed BlueBravos use of various <a href="https://twitter.com/cglyer/status/1398082383392477190">iterations</a> of a <a href="https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/">phishing campaign</a> emulating government entities. The various campaigns delivered ISO files via methods such as <a href="https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/">using</a> URLs to download the ISO file and execute an LNK file, and using an HTML <a href="https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/">attachment</a> in the email to initiate the download of an ISO file. This activity was used to deploy NativeZone, an umbrella term for their custom Cobalt Strike loaders. NativeZone typically uses rundll32.exe to load and execute follow-on payload(s).</p><p>BlueBravo employs a wide range of custom malware and open-source tooling. A notable facet is their <a href="https://www.epicturla.com/previous-works/vb2018">evolving</a> malware families and development practices, with implants developed in various languages including <a href="https://unit42.paloaltonetworks.com/unit-42-technical-analysis-seaduke/">Python</a>, <a href="https://www.pwc.co.uk/issues/cyber-security-services/insights/cleaning-up-after-wellmess.html">Go</a>, <a href="https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html">PowerShell</a>, and <a href="https://www.welivesecurity.com/2014/05/20/miniduke-still-duking/">Assembly</a>.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2022_1202_Blog_Intelligence_Report_Main_Feature_bd18c12b17.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[I, Chatbot]]></title>
            <link>https://www.recordedfuture.com/i-chatbot</link>
            <guid>https://www.recordedfuture.com/i-chatbot</guid>
            <pubDate>Thu, 26 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[New Recorded Future®, Insikt Group® research examines the ways in which threat actors can utilize ChatGPT for malicious use.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0126.pdf">click here</a> to download the report as a PDF.</em></p><h2 id="executive-summary">Executive Summary</h2><p>ChatGPT is a chatbot developed by OpenAI, an artificial intelligence (AI) laboratory based in the US, which uses the GPT-3 family of autoregressive (AR) language models. ChatGPT <a href="https://openai.com/blog/chatgpt/">launched</a> on November 30, 2022, and has been subject to widespread attention. Among the potential advantages of ChatGPT, we have also identified several potential use cases ripe for abuse. While ChatGPT has the potential to be abused by nation-state actors to enable cyberespionage, information operations (IOs), and disruptive cyberattacks (cyberwarfare), we believe these use cases are not as immediate threats as those posed by cybercriminals. Short term, we believe that non-state actors with limited technical knowledge and resources pose a more serious threat via the malicious use of ChatGPT. </p><p>The types of threat actors that we believe currently pose the most threat can be classified as script kiddies, hacktivists, scammers and spammers, payment card fraudsters, and threat actors engaging in other lowly and disreputable forms of cybercrime. Within days of the ChatGPT launch, we identified many threat actors on dark web and special-access forums sharing buggy but functional malware, social engineering tutorials, money-making schemes, and more  all enabled by the use of ChatGPT. While none of these activities have risen to the seriousness of ransomware, data extortion, denial of service, cyberterrorism, and so on, these attack vectors remain possibilities.</p><p>This report uses ChatGPT itself, sometimes in its own words, to demonstrate its functionality, rationalize its use and abuse, and replicate threats that currently exist in the cybercriminal underground.</p><h2 id="key-findings">Key Findings</h2><ul><li>ChatGPT lowers the barrier to entry for threat actors with limited programming abilities or technical skills. It can produce effective results with just an elementary level of understanding in the fundamentals of cybersecurity and computer science.</li><li>We identified threat actors on dark web and special-access sources sharing proof-of-concept ChatGPT conversations that enable malware development, social engineering, disinformation, phishing, malvertising, and money-making schemes.</li><li>We believe that non-state threat actors pose the most immediate threat to individuals, organizations, and governments via the malicious use of ChatGPT.</li><li>With limited time and experience on the ChatGPT platform, we were able to replicate malicious code identified on dark web and special-access forums.</li></ul><h2 id="background">Background</h2><p><strong>(The following description was written by ChatGPT and transcribed verbatim in response to the prompt to provide a detailed response addressing its history and functionality.)</strong></p><p><em>ChatGPT, or the Generative Pre-training Transformer, is a powerful conversational language model developed by OpenAI. It is based on the GPT architecture and was first released in 2019. Since then, it has undergone several updates, including the release of version 3 in 2020.</em></p><p><em>The model was trained on a large corpus of text data and is capable of understanding and responding to a wide range of topics and prompts. This makes it highly versatile and well-suited for a variety of natural language processing (NLP) tasks, including question answering, language translation, text summarization, and even creative writing. One of the key strengths of ChatGPT is its ability to generate highly coherent and contextually appropriate text, which is why it is often used in applications such as chatbots, virtual assistants, and automated writing.</em></p><p><em>The model&#39;s large capacity allows it to perform well on NLP tasks with minimal fine-tuning. This makes it an attractive option for developers and researchers looking to build custom NLP models without the need for extensive training data. However, it&#39;s important to note that ChatGPT is a unidirectional model, meaning it can only generate text based on the input it has been given. This means that it is not able to answer questions that rely on understanding the context of the conversation or the world.</em></p><p><em>One of the most common use cases for ChatGPT is in chatbot development. The model&#39;s ability to generate human-like text makes it well-suited for creating chatbot conversations that are natural and engaging for users. This can be especially useful for customer service chatbots, which can handle a wide range of customer queries and complaints without the need for human intervention.</em></p><p><em>Another popular use case for ChatGPT is in automated writing. The model can be fine-tuned to generate articles, stories, and other forms of written content with a high degree of coherence and fluency. This can be useful for content generation in a variety of industries, including journalism, marketing, and publishing.</em></p><p><em>Additionally, ChatGPT can be used for language translation, which can be highly beneficial for companies and organizations that operate in multiple languages. The model can be fine-tuned to translate text from one language to another with a high degree of accuracy, which can save companies significant time and resources.</em></p><p><em>In conclusion, ChatGPT is a powerful conversational language model that can be used for a wide range of NLP tasks. Its ability to generate highly coherent and contextually appropriate text makes it well-suited for applications such as chatbots, virtual assistants, and automated writing. Additionally, its large capacity allows it to perform well on NLP tasks with minimal fine-tuning, making it an attractive option for developers and researchers looking to build custom NLP models.</em></p><p>ChatGPT was launched publicly by OpenAI on November 30, 2022. In the following weeks, it garnered widespread media attention for its functionality and its seemingly boundless potential for future use. Researchers, academics, and journalists speculated on use cases. Among the proposed benefits of ChatGPT include the <a href="https://devops.com/will-chatgpt-replace-developers/">automation of engineering tasks</a>, applications for <a href="https://medium.datadriveninvestor.com/mastering-chatgpt-in-python-a53814e834b0?gi=8325a6c93293">data science</a> and analytics, software development, <a href="https://www.nytimes.com/2023/01/12/technology/chatgpt-schools-teachers.html">educational technology</a> (edtech), and much more.</p><p><img src="https://cms.recordedfuture.com/uploads/Chatbot_001_9e6b3aa192.png" alt="Chatbot-001.png"><em><strong>Figure 1:</strong> References to ChatGPT on dark web and special-access forums (Source: Recorded Future)</em></p><p>Amid the excitement, optimism, and <a href="https://mindmatters.ai/2022/12/yes-chatgpt-is-sentient-because-its-really-humans-in-the-loop/">transhumanist thought-experimenting</a>, some cynicism has been expressed about the use of ChatGPT for deceptive, unethical, or malicious purposes. Some have argued that ChatGPT should be <a href="https://www.washingtonpost.com/education/2023/01/05/nyc-schools-ban-chatgpt/">banned in schools</a> due to its potential for enabling <a href="https://www.axios.com/2023/01/13/chatgpt-schools-teachers-ai-debate">plagiarism</a> and <a href="https://www.ft.com/content/2e97b7ce-8223-431e-a61d-1e462b6893c3">systemic cheating</a> on homework, writing assignments, and take-home exams. Others believe that its open registration policy makes it easily accessible for threat actors <a href="https://www.axios.com/2023/01/10/hackers-chatgpt-malware-cybercrime-ai">interested in developing malware</a>, gaining unauthorized access to networks, or <a href="https://www.csoonline.com/article/3685368/study-shows-attackers-can-use-chatgpt-to-significantly-enhance-phishing-and-bec-scams.html">coordinating convincing phishing campaigns</a>. These debates raise questions about the authenticity and accuracy of ChatGPT (which is expected to improve over time) and its effects on the job market, remote work and education, freelancing, and more. </p><p>Will ChatGPT cause a widespread market disruption and displace individuals in affected roles? As an experiment, we examined some of the top-rated listings from the most active content creators on freelancing platforms such as Fiverr. We used ChatGPT to replicate these tasks, generating 500 to 1,000-word research papers in seconds, as well as miscellaneous technical tasks.</p><p><img src="https://cms.recordedfuture.com/uploads/Chatbot_002_861f9f62fd.png" alt="Chatbot-002.png"><img src="https://cms.recordedfuture.com/uploads/Chatbot_003_0ca2dea600.png" alt="Chatbot-003.png"><em><strong>Figure 2:</strong> ChatGPT performing Writing &amp; Translation tasks commonly advertised on the Fiverr freelancing platform. The tasks were chosen at random and based on top-rated Fiverr results. Tasks include writing 500-word essays on the causes of the American Revolution (Left) and the optimal number of sets and repetitions for muscular hypertrophy (Right). (Source: Recorded Future, ChatGPT)</em></p><p><img src="https://cms.recordedfuture.com/uploads/Chatbot_004_7652fc704d.png" alt="Chatbot-004.png"><img src="https://cms.recordedfuture.com/uploads/Chatbot_005_3c87d89567.png" alt="Chatbot-005.png"><em><strong>Figure 3:</strong> ChatGPT performing Programming &amp; Tech tasks commonly advertised on the Fiverr freelancing platform. Tasks were chosen at random and based on top-rated Fiverr results. They include creating an interactive advertisement banner in Javascript for a WordPress website (Left), a template for a responsive email newsletter in HTML (Right). (Source: Recorded Future, ChatGPT)</em></p><p>Cybercriminals have quickly caught on to this functionality of ChatGPT, monetizing fraudulent freelance work that uses ChatGPT to automate contracted tasks en masse. Threat actors also claim to have written e-books with ChatGPT, which they have allegedly listed for sale under false pen names on popular marketplaces. In some cases, these same threat actors have publicly claimed to make upwards of $4,000 per day abusing ChatGPT to deceive clients and customers. We believe that these earnings claims are possible, but likely an exaggeration intended to direct traffic to the authors profile.</p><p>Cybercriminals have also used ChatGPT to write scripts that automate commands such as dice rolling and strategic betting for online casinos and sports betting platforms, cheat on online videogames, create fraudulent affiliate marketing redirects to earn passive income, and more. Many of these tutorials are openly accessible on forums, messaging platforms, and social media frequented by cybercriminals and require no prior registration to view. </p><p>Below is a sample of such advertisements from the low-tier, English-language Cracked Forum, between December 16, 2022, and January 2, 2023:</p><p><img src="https://cms.recordedfuture.com/uploads/Chatbot_006_7e3d3f9c89.png" alt="Chatbot-006.png"><img src="https://cms.recordedfuture.com/uploads/Chatbot_007_ef8257084f.png" alt="Chatbot-007.png"><img src="https://cms.recordedfuture.com/uploads/Chatbot_008_56dd27f671.png" alt="Chatbot-008.png"><img src="https://cms.recordedfuture.com/uploads/Chatbot_009_7404148115.png" alt="Chatbot-009.png"><img src="https://cms.recordedfuture.com/uploads/Chatbot_010_37e82a7291.png" alt="Chatbot-010.png"><em><strong>Figure 4:</strong> Cybercriminal advertisements and tutorials on the low-tier Cracked Forum for money-making schemes using ChatGPT. Most schemes involve completing fraudulent tasks on freelancing platforms, auto-rolling on online casinos (Middle, Left), and directing traffic to affiliate marketing links (Bottom). (Source: Cracked Forum)</em></p><p>With the rise of ChatGPT in popularity on dark web and special-access forums also comes an influx of threat actors asking to register untraceable, unattributable, or fraudulent accounts with OpenAI that violate the ChatGPT community standards. In some cases, especially for threat actors physically located in the Commonwealth of Independent States (CIS), tutorials for registering accounts with temporary (burner) Russian phone numbers have also appeared.</p><p><img src="https://cms.recordedfuture.com/uploads/Chatbot_011_f662fd69cd.png" alt="Chatbot-011.png"><em><strong>Figure 5:</strong> MrK inquires about registering an account without a phone number (Source: Recorded Future, BreachForums)</em></p><p><img src="https://cms.recordedfuture.com/uploads/Chatbot_012_6858b4e379.png" alt="Chatbot-012.png"><em><strong>Figure 6:</strong> Lorensaire, a member of the top-tier Russian-language cybercriminal forum XSS, inquires about acquiring an OpenAI application programming interface (API) key without the use of a verified phone number. The threat actor indicated that their Russian phone number cannot be used for SMS verification. (Source: Recorded Future, XSS).</em></p><p>Some threat actors, such as 0x27 and USDoD (aka NetSec, Scarfac33) on the mid-tier BreachForums, have used recent articles on the malicious use of ChatGPT from cybersecurity researchers at <a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/">Checkpoint</a>, <a href="https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/?sh=6e805b555349">Forbes</a>, and <a href="https://arstechnica.com/information-technology/2023/01/chatgpt-is-enabling-script-kiddies-to-write-functional-malware/">Ars Technica</a> to inflate their personal brand and boost their credibility rating on the forum. These articles, while showing the potential threat of ChatGPT abuse, have also brought attention to the threat actors that are engaging in such activities  to an extent, possibly legitimizing them and solidifying their reputation. While many threat actors are opportunistic and financially motivated, some are ego-driven and inspired by media attention.</p><p><img src="https://cms.recordedfuture.com/uploads/Chatbot_013_cf621255f8.png" alt="Chatbot-013.png"><em><strong>Figure 7:</strong> The threat actor 0x27 acknowledges reporting on the malicious use of ChatGPT, which includes references to previous threads authored by 0x27 and USDoD on BreachForums. (Source: Recorded Future, BreachForums)</em></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0126.pdf">click here</a> to download the report as a PDF.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/i_chatbot_92c32ac326.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Annual Payment Fraud Intelligence Report: 2022]]></title>
            <link>https://www.recordedfuture.com/annual-payment-fraud-intelligence-report-2022</link>
            <guid>https://www.recordedfuture.com/annual-payment-fraud-intelligence-report-2022</guid>
            <pubDate>Tue, 17 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future's Insikt Group details the top trends and metrics of the payment card fraud landscape in 2022 and provides insights into what to expect in 2023.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0117.pdf">click here</a> to download the report as a PDF.</em></p><p><em>This report provides trends and metrics for the payment card fraud landscape in 2022 and identifies the merchants most frequently compromised or abused as tester merchants. The target audience of this report is fraud and cyber threat intelligence (CTI) teams at financial institutions and merchant services companies.</em></p><h3 id="executive-summary">Executive Summary</h3><p>2022 was a year of system shocks, and the payment card fraud market did not survive unscathed. Russias cybercrime crackdown  followed promptly by its full-scale invasion of Ukraine in February 2022  spawned lower carding volumes for the remainder of the year. In total, 2022 saw 45.6 million card-not-present (CNP) and 13.8 million card-present (CP) payment card records posted for sale to carding shops on the dark web. These figures were considerably lower than the 60 million CNP and 36 million CP records posted for sale in 2021. Taken together, this decreased supply, demand, and turnover defined the payment card fraud market and threat landscape throughout 2022.</p><p>In spite of this, the card fraud market and the threat actors who populate it demonstrated remarkable resilience. Magecart actors launched campaigns that employed fake payment card forms, exploited legitimate merchant web infrastructure to deploy e-skimmers, and used HTTP referer headers to impede remediation by security analysts. One of these campaigns led to the compromise of 2 online ordering platforms, a trending tactic that exposes merchants who use the platforms to the risk of being compromised. Meanwhile, high-profile merchants were increasingly exploited by individual threat actors and checker services on the dark web in order to verify the validity of stolen cards. And finally, as war in Ukraine hampered cybercriminals ability to engage in card fraud, one top-tier carding shop exploited the lull in supply by flooding the market with recycled payment card records. Although frustrated by these records low quality, resourceful threat actors may nevertheless use them as cheap sources of personally identifiable information (PII) that they can weaponize to carry out targeted account takeover (ATO) attacks against their victims.</p><p>By employing proactive anti-fraud strategies that integrate intelligence from throughout the payment fraud life cycle, financial institutions and card issuers can reduce card fraud losses in 2023. The overall level of card fraud activity in 2023 will be highly dependent on whether or not Russias war in Ukraine continues; if it does, threat actors ability to engage in card fraud will likely remain degraded. But should the war end, a renewal or increase in payment card fraud may follow.</p><h3 id="key-findings">Key Findings</h3><ul><li>45.6 million CNP payment card records were posted across dark web carding shops in 2022, down 24% from 2021. It is highly likely that this years relatively low CNP volumes are the result of Russias early-2022 cybercrime crackdown and its subsequent full-scale invasion of Ukraine. In 2022, the highest-impact CNP breaches affected online ordering platforms.</li><li>13.8 million CP payment card records were posted across dark web carding shops in 2022, down 62% from 2021. While it is possible the years events contributed to this drop-off, year-by-year CP volumes have also steadily declined due to the rising global adoption of more secure in-person payment methods. In 2022, CP breaches overwhelmingly affected small restaurants and bars.</li><li>The Recorded Future Magecart Overwatch program discovered 1,520 unique malicious domains involved in the infections of 9,290 unique e-commerce domains at any point in 2022. </li><li>Full primary account numbers (PANs) for at least 20.5 million compromised payment cards were posted as plaintext or images to various resources including dark web forums, pastebins, and social media.</li><li>21 card checker services monitored by Recorded Future abused 2,953 unique merchants associated with 660 unique merchant identification numbers (MIDs) for illicit card checks.</li><li>Threat actors focused on avoiding or bypassing protections offered by the 3-D Secure (3DS) protocol and increasingly discussed the abuse of customer service call centers as a means of facilitating their attacks. Furthermore, a surge in cheap, reposted payment card records posted throughout 2022 increased the attack surface for ATO attacks.</li><li>The payment fraud life cycle closely resembles a real-world market underpinned by supply chains, coordinated exchange between buyers and sellers, and the provision of services such as checkers. Although this high degree of organization increases the opportunities and impact of card fraud, it also produces a data-rich environment. Therefore, card issuers, acquirers, and merchant service providers should incorporate and integrate intelligence from across the payment fraud life cycle to proactively combat fraud.</li></ul><h3 id="background">Background</h3><p>Payment card fraud exists as part of a sophisticated underground economy. Production networks, supply chains, and dark web carding shops provide threat actors with the means to market criminal services and wares to their peers or to purvey stolen data to end users who engage in card fraud. Within this shadow economy, payment card fraud conforms to a certain life cycle, as seen in Figure 1 below.</p><p><img src="https://cms.recordedfuture.com/uploads/annual_payment_fraud_intelligence_report_2022_fig1_aa0df5f3f0.png" alt="annual-payment-fraud-intelligence-report-2022-fig1.png"><strong>Figure 1:</strong> <em>Payment card fraud conforms to a general life cycle (Source: Recorded Future)</em></p><p>At the beginning of the life cycle, physical compromises facilitate the theft of payment card data from merchants card-present (CP) transactions. Meanwhile, cybercriminals enact digital compromises  often with Magecart e-skimmer infections  to steal card data from online card-not-present (CNP) transactions. These stolen card records are posted for sale to the dark web, where partial payment card data is put on display so criminal buyers can go window shopping. Occasionally, carding shops release full stolen payment card data for promotional purposes, which provides one of the many opportunities for criminals to snatch up full primary account numbers (PANs). Before making a sale, carding shops use aptly named checkers to appraise stolen card sets; individual criminals use the same checkers to verify their records validity before or after purchase. Once end user fraudulent actors acquire their desired payment card data, they monetize it, usually through fraudulent transactions. If actors can acquire enough of a victims personally identifiable information (PII), they can even attempt account takeover (ATO) attacks to cash out their victims bank account.</p><p>Throughout 2022, Recorded Future monitored this shadow economy to empower clients to disrupt fraud at every stage of the payment card fraud life cycle. In the course of our monitoring, we observed both continuing trends from 2021 and novel trends that grew organically from the events of 2022.</p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0117.pdf">click here</a> to download the report as a PDF.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/annual_payment_fraud_intelligence_report_2022_c59a144484.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Current Trends in the Turkish-Language Dark Web]]></title>
            <link>https://www.recordedfuture.com/current-trends-in-the-turkish-language-dark-web</link>
            <guid>https://www.recordedfuture.com/current-trends-in-the-turkish-language-dark-web</guid>
            <pubDate>Thu, 12 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future’s Insikt Group examines the capabilities, culture, and organizational structure of Turkish-language hacking and cybercrime forums.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/Primary_Logo_Insikt_Digital_RGB_45f99b2dc9.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p><em>Editors Note: This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0112.pdf">click here</a> to download the report as a PDF.</em></p><p><em>We analyzed advertisements, posts, and interactions within Turkish-language hacking and cybercrime forums to explore the capabilities, culture, and organization of these communities. This report is a follow-up to our previous reporting on the state of the Turkish-language dark web as part of a series analyzing cybercriminal communities in <a href="https://www.recordedfuture.com/brazilian-hacking-communities/">Brazil</a>, <a href="https://www.recordedfuture.com/russian-chinese-hacking-communities/">Russia and China</a>, <a href="https://www.recordedfuture.com/japanese-underground-communities/">Japan</a>, and <a href="https://www.recordedfuture.com/ashiyane-forum-history/">Iran</a>. It will be of greatest interest to organizations and geopolitical analysts seeking to understand the cybercriminal underground in order to better monitor security-related threats, as well as to those researching the Turkish-language underground.</em></p><h2 id="executive-summary">Executive Summary</h2><p>Turkeys increasingly unstable financial situation, with record inflation rates and a plummeting Turkish lira, has created conditions for disenfranchised young people to join underground communities and engage further in cybercriminal activities. We found that Turkish patriotic hacking collectives are continuing their defacement operations and at least 1 threat group is working to engage in more sophisticated hacking activities. Turkish-language cybercriminals are active on English- and Russian-language forums where they share and sell compromised data from Turkish entities. In our research, we identified at least 3 Turkish-language ransomware groups and we developed a YARA rule to detect TurkStatik Ransomware. </p><p>With the prevalence of ransomware-as-a-service (RaaS) models and the resulting decrease in barriers for entry to the ransomware space, we expect an increase in the number of Turkish-language ransomware groups. As a cornerstone of the Turkish underground community, we expect patriotic hacking collectives to continue their operations. </p><h2 id="key-judgments">Key Judgments</h2><ul><li>Turkish patriotic hackers continue their defacement operations targeting countries they perceive to be enemies of Turkey, and in some cases aim to ramp up the sophistication of their activities including leaking confidential data and building a hacktivist botnet.</li><li>Turkish-language, financially motivated threat actors advertise their services, methods, and stolen data on popular global forums to avoid Turkish law enforcement attention and appeal to a larger audience. We identified at least 3 Turkish-language ransomware variants being used by threat groups including TurkStatik, SifreCikis, and DeadLocker. At the time of this report, we do not know the number of victims in Turkey affected by these ransomware variants as the operators of said ransomware do not operate extortion websites.</li></ul><h2 id="background">Background</h2><p>As outlined in our previous reporting, Turkish-speaking dark web communities primarily focus on 2 functional areas: patriotic hacking (hacktivism) and financially motivated cybercrime. Patriotic hacking communities frequently respond to geopolitical events around the world, especially those relating to Turkey, and show support for the government agenda by targeting countries perceived to be enemies of Turkey. Financially motivated communities focus on a variety of fraud-related activities such as payment card fraud, data breaches, and social engineering. Due to pressure from law enforcement, Turkish-language forums do not host content, data, or methods targeting Turkish organizations. A majority of the compromised data and attack methods targeting Turkish organizations are found on English- or Russian-language forums like BreachForums, XSS, and Exploit. </p><p>Increased political and financial instability in Turkey are likely contributing factors to the popularity of dark web forums and financially motivated cybercrime. Researchers have <a href="https://www.researchgate.net/publication/334641577_Unemployment_Migration_and_Cyber_Criminality_in_Nigeria">argued</a> for a correlation between financial instability (particularly youth unemployment) and cybercrime rates, using the <a href="https://www.nairaland.com/4057843/tackling-unemployment-youth-involvement-cybercrime">case study</a> of Nigeria as an example. On October 3, 2022, data from the Turkish Statistical Institute (TUIK) <a href="https://www.reuters.com/world/middle-east/turkeys-inflation-hits-fresh-24-year-high-83-after-rate-cuts-2022-10-03/">showed</a> that inflation levels hit a 24-year high with 83.45% inflation, while independent experts at the Inflation Research Group (a private research group in Turkey) <a href="https://www.bbc.com/news/world-europe-63120478">estimate</a> the annual rate to be much higher at approximately 186.27%. Despite high inflation rates, the Central Bank of the Republic of Turkey has been pursuing an unorthodox easing cycle approach by lowering interest rates. As a result, the Turkish lira lost 44% of its value against the dollar in 2021, and the lira hit an all-time low in <a href="https://www.reuters.com/world/middle-east/turkeys-cenbank-shocks-again-with-100-point-rate-cut-2022-09-22/">September 2022</a> with a further 100-point reduction in interest rates. The rising cost of living combined with the volatile financial situation continues to <a href="https://qoshe.com/canadian-dimension/nesi-altaras/turkey-s-worsening-crisis-leaves-youth-with-little-hope/148497542">impoverish Turkeys youth</a>.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2022_1202_Blog_Intelligence_Report_Main_Feature_bd18c12b17.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[RedDelta Targets European Government Organizations and Continues to Iterate Custom PlugX Variant]]></title>
            <link>https://www.recordedfuture.com/reddelta-targets-european-government-organizations-continues-iterate-custom-plugx-variant</link>
            <guid>https://www.recordedfuture.com/reddelta-targets-european-government-organizations-continues-iterate-custom-plugx-variant</guid>
            <pubDate>Fri, 23 Dec 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group® examines operations conducted by likely Chinese state-sponsored threat activity group RedDelta targeting organizations across Asia and Europe.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em><strong>Editors Note:</strong> This is an excerpt of a full report. To read the entire analysis with endnotes, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2022-1223.pdf">click here</a> to download the report as a PDF.</em></p><p><em>This report details recent activity conducted by the likely Chinese state-sponsored threat activity group RedDelta. The activity was identified through a combination of large-scale automated network traffic analytics and expert analysis. This report will be of most interest to individuals and organizations with strategic and operational intelligence requirements relating to Chinese cyber threat activity, as well as network defenders in government organizations within Southeast Asia and Europe.</em></p><h3 id="executive-summary">Executive Summary</h3><p>Recorded Futures Insikt Group continues to track activity we attribute to the likely Chinese state-sponsored threat activity group RedDelta targeting organizations within Europe and Southeast Asia using a customized variant of the PlugX backdoor. Since at least 2019, RedDelta has been consistently active within Southeast Asia, particularly in Myanmar and Vietnam, but has also routinely adapted its targeting in response to global geopolitical events. This is historically evident through the groups targeting of the Vatican and other Catholic organizations in the lead-up to 2021 talks between Chinese Communist Party (CCP) and Vatican officials [<a href="https://go.recordedfuture.com/hubfs/reports/cta-2020-0728.pdf">1</a>,<a href="https://www.recordedfuture.com/reddelta-cyber-threat-operations">2</a>], as well as throughout 2022 through the groups shift towards increased targeting of European government and <a href="https://www.proofpoint.com/uk/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european">diplomatic entities</a> following Russia&#39;s invasion of Ukraine.</p><p>During the 3-month period from September through November 2022, RedDelta has regularly used an infection chain employing malicious shortcut (LNK) files, which trigger a dynamic-link library (DLL) search-order-hijacking execution chain to load consistently updated PlugX versions. Throughout this period, the group repeatedly employed decoy documents specific to government and migration policy within Europe. Of note, we identified a European government department focused on trade communicating with RedDelta command-and-control (C2) infrastructure in early August 2022. This activity commenced on the same day that a RedDelta PlugX sample using this C2 infrastructure and featuring an EU trade-themed decoy document surfaced on public malware repositories. We also identified additional probable victim entities within Myanmar and Vietnam regularly communicating with RedDelta C2 infrastructure.</p><p>RedDelta closely overlaps with public industry reporting under the aliases BRONZE PRESIDENT, Mustang Panda, TA416, Red Lich, and HoneyMyte.</p><h3 id="key-judgments">Key Judgments</h3><ul><li>RedDelta has consistently conducted long-term cyber-espionage campaigns in line with the strategic interests of the Chinese government, including historical targeting of government and public sector organizations across Asia and Europe as well as overseas organizations associated with minority groups within mainland China such as Tibetan and Catholic Church-related entities.</li><li>Despite the volume of public reporting on the groups activity, RedDelta employs a high operational tempo relative to other state-sponsored actors. The group also maintains a rapid pace of development for its flagship backdoor (remote access trojan [RAT]), a variant of the long-running backdoor PlugX that is heavily customized for anti-analysis for detection evasion.</li><li>In November 2022, RedDelta actors shifted from using archive files to using malicious optical disc image (ISO) files containing a simplified shortcut (LNK) file for delivery of an updated PlugX payload.</li></ul><p><img src="https://cms.recordedfuture.com/uploads/reddelta_targets_european_government_organizations_continues_iterate_custom_plugx_variant_01_e20de5f0ec.png" alt="reddelta-targets-european-government-organizations-continues-iterate-custom-plugx-variant-01.png"></p><p><strong>Figure 1</strong>: High-level RedDelta TTPs and Recorded Future data-sourcing graphic; historically reported TTPs are shown in gray [<a href="https://go.recordedfuture.com/hubfs/reports/cta-2020-0728.pdf">1</a>,<a href="https://www.recordedfuture.com/reddelta-cyber-threat-operations">2</a>] (Source: Recorded Future)_</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/reddelta_targets_european_government_organizations_and_continues_iterate_custom_plugx_variant_e6984396ce.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Exposing TAG-53’s Credential Harvesting Infrastructure Used for Russia-Aligned Espionage Operations]]></title>
            <link>https://www.recordedfuture.com/exposing-tag-53-credential-harvesting-infrastructure-for-russia-aligned-espionage-operations</link>
            <guid>https://www.recordedfuture.com/exposing-tag-53-credential-harvesting-infrastructure-for-russia-aligned-espionage-operations</guid>
            <pubDate>Mon, 05 Dec 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[A recent spear phishing attempt uncovers a Russia-aligned cyber espionage campaign targeting government, intelligence, and military industries.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: <a href="https://go.recordedfuture.com/hubfs/reports/cta-2022-1205.pdf">Click here</a> to download the report as a PDF.</em></p><p>This report profiles the infrastructure used by the threat activity group TAG-53, which overlaps with public reporting on Callisto Group, COLDRIVER, and SEABORGIUM. The activity was identified through a combination of Network Intelligence and analysis derived from open-source reporting. The report will be of most interest to network defenders and individuals engaged in strategic and operational intelligence relating to the activities of the Russian state in cyberspace.</p><h4 id="executive-summary">Executive Summary</h4><p>Beginning in July 2022, Recorded Futures Insikt Group observed the recurring use of similar infrastructure by the threat activity group TAG-53. This newly discovered infrastructure likely overlaps with other infrastructure tactics, techniques, and procedures (TTPs) previously attributed to Callisto Group, COLDRIVER, and SEABORGIUM, who have been linked to activity aligning with Russian state interests.</p><p>Insikt Group has observed the recurring use of common traits by TAG-53 when curating its infrastructure, including the use of domain names employing a specific pattern construct along with Lets Encrypt TLS certificates, the use of a specific cluster of hosting providers, and the use of a small cluster of autonomous systems.</p><p>TAG-53 infrastructure was found to contain a spoofed Microsoft login page masquerading as a legitimate military weapons and hardware supplier in the United States, suggesting that some TAG-53 infrastructure has likely already been operationalized. Based on historical public reporting on overlapping TAG-53 campaigns, it is likely that this credential harvesting activity is enabled in part through phishing.</p><h4 id="key-judgments">Key Judgments</h4><ul><li>Insikt Group has identified new infrastructure used by TAG-53, a group likely linked to suspected Russian threat activity groups Callisto Group, COLDRIVER, and SEABORGIUM.</li><li>The identified TAG-53 infrastructure features common traits including the use of specific domain registrars, the use of Lets Encrypt TLS certificates, and a small cluster of autonomous systems. Most of TAG-53s domains use a specific stylistic structure.</li><li>TAG-53 has used domains masquerading as organizations across multiple industry verticals, with a particular focus on government, intelligence, and military industries.</li></ul><h4 id="background">Background</h4><p>TAG-53 is consistent when setting up its infrastructure, which bears significant hallmarks and crossover with infrastructure attributed to Callisto Group, COLDRIVER, and SEABORGIUM. The group continues to use particular stylistic structures when registering malicious domains alongside the use of specific domain registrars with IP addresses that reside in a small cluster of autonomous systems.</p><p>On August 15, 2022, a Microsoft <a href="https://www.microsoft.com/en-us/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations">report</a> published in collaboration with Googles Threat Analysis Group (TAG) and Proofpoints Threat Research Team detailed SEABORGIUMs phishing operations. In this research, Microsoft assesses that SEABORGIUM originates from Russia and has objectives and victimology that align closely with Russian state interests. Microsoft denotes that SEABORGIUM shares overlaps with Callisto Group, TA446, and COLDRIVER and indicates that the threat actor has carried out persistent phishing and credential theft campaigns that have led to intrusions and data theft. SEABORGIUM primarily focuses its targeting on NATO countries, including a specific emphasis on the United States and the United Kingdom. The group also targeted Ukraine in the run-up to Russias full-scale invasion of the country in February 2022.</p><p>Googles TAG <a href="https://blog.google/threat-analysis-group/tracking-cyber-activity-eastern-europe">reported</a> in March and <a href="https://blog.google/threat-analysis-group/update-on-cyber-activity-in-eastern-europe">updated</a> in May 2022 that COLDRIVER has conducted credential phishing campaigns using Gmail accounts targeting nongovernmental organizations and think tanks, journalists, and government and defense officials. TAG also suggests that COLDRIVERs TTPs have evolved over time, moving towards incorporating PDF or DOC file links that are hosted on Google Drive and Microsoft OneDrive within its phishing emails.</p><h4 id="threat-and-technical-analysis">Threat and Technical Analysis</h4><p>Insikt Group used intelligence provided in open-source reporting (<a href="https://www.microsoft.com/en-us/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations">1</a>, <a href="https://blog.sekoia.io/calisto-continues-its-credential-harvesting-campaign">2</a>, <a href="https://blog.google/threat-analysis-group/tracking-cyber-activity-eastern-europe">3</a>, <a href="https://blog.google/threat-analysis-group/update-on-cyber-activity-in-eastern-europe">4</a>) to profile TAG-53 infrastructure that likely overlaps with Callisto Group, COLDRIVER, and SEABORGIUM infrastructure. TAG-53 infrastructure was uncovered by analyzing specific combinations of domain registrars, autonomous systems, domain name structures, and related TLS certificates. Based on this information, it is highly likely that this threat group is continuing its phishing and credential-harvesting operations. While monitoring TAG-53 infrastructure, Insikt Group observed a spoofed Microsoft login page masquerading as a legitimate military weapons and hardware supplier in the US, suggesting that some TAG-53 infrastructure has likely already been operationalized.</p><h5 id="registrars">Registrars</h5><p>Using both current and passive Domain Name System (DNS) records, Insikt Group resolved IP addresses for 38 registered domains used by TAG-53 since January 2022. The identified TAG-53 domains, listed in Appendix A, have highlighted a trend towards the use of NameCheap, Porkbun, REG.RU, and regway for domain registration that has persisted since mid-2022, a breakdown of which can be seen in Figure 1. The reason for the preference of these registrars is unknown, but it is a useful metric when profiling candidate TAG-53 infrastructure.</p><p><img src="https://cms.recordedfuture.com/uploads/exposing_tag_53_credential_harvesting_infrastructure_for_russia_aligned_espionage_operations_figure_1_da7f4e49d7.png" alt="exposing_tag_53_credential_harvesting_infrastructure_for_russia_aligned_espionage_operations_figure_1.png"></p><p><strong>Figure 1: Breakdown of domain registrars used by TAG-53 since January 2022 (Source: Recorded Future)</strong></p><h5 id="autonomous-systems">Autonomous Systems</h5><p>Alongside the use of specific domain registrars is the use of particular autonomous systems, with all domains collected under TAG-53 found to exist in 10 autonomous systems with a significant concentration found located in 2 Autonomous System Numbers (ASNs) linked to MIRhosting (AS52000) and Hostwinds (AS54290) shown in Table 1 below.</p><table>    <tbody>      <tr>        <td style="background-color:#000000;color:#ffffff;">ASN</td>        <td style="background-color:#000000;color:#ffffff;">AS Name</td>        <td style="background-color:#000000;color:#ffffff;">TAG-53 Domain Count</td>      </tr>      <tr>        <td>AS52000</td>        <td>MIRhosting</td>        <td>11</td>      </tr>      <tr>        <td>AS54290</td>        <td>HOSTWINDS</td>        <td>10</td>      </tr>      <tr>        <td>AS44094</td>        <td>WEBHOST1-AS</td>        <td>4</td>      </tr>      <tr>        <td>AS62240</td>        <td>Clouvider</td>        <td>4</td>      </tr>      <tr>        <td>AS62005</td>        <td>BV-EU-AS</td>        <td>3</td>      </tr>      <tr>        <td>AS44477</td>        <td>STARK-INDUSTRIES</td>        <td>2</td>      </tr>      <tr>        <td>AS16276</td>        <td>OVH</td>        <td>1</td>      </tr>      <tr>        <td>AS20278</td>        <td>NEXEON</td>        <td>1</td>      </tr>      <tr>        <td>AS206446</td>        <td>CLOUDLEASE</td>        <td>1</td>      </tr>      <tr>        <td>AS43624</td>        <td>STARK-INDUSTRIES-SOLUTIONS-AS</td>        <td>1</td>      </tr>    </tbody>    </table>    <br /><p><strong>Table 1: ASN detail breakdown for TAG-53 linked domains (Source: Recorded Future)</strong></p><h5 id="domain-name-structure">Domain Name Structure</h5><p>Most of the domains discovered via TAG-53 tracking use similarly structured domain names, primarily made up of 2 terms separated by a hyphen, such as cloud-safety[.]online. Of the 38 domains identified, 33 used the stylistic form <word>-<word>.(com|online|ru). Of the remaining 5 domains, 4 were found to be similar, but consisted of 3 terms and 2 hyphens  share-drive-ua[.]com, network-storage-ltd[.]com, land-of-service[.]com, and nonviolent-conflict-service[.]com  and 1 contained no hyphens  proxycrioisolation[.]com. However, additional factors enabled Insikt Group to link these domains to the rest of TAG-53s infrastructure.</p><p>A breakdown of the terms found in TAG-53 domains, shown in Figure 2, highlights the repeated use of specific words within the domains, most of which are common, generic computing terms.</p><p><img src="https://cms.recordedfuture.com/uploads/exposing_tag_53_credential_harvesting_infrastructure_for_russia_aligned_espionage_operations_figure_2_6a937c5eb7.png" alt="exposing_tag_53_credential_harvesting_infrastructure_for_russia_aligned_espionage_operations_figure_2.png"></p><p><strong>Figure 2: Breakdown of terms used in TAG-53 linked domains (Source: Recorded Future)</strong></p><h5 id="x509-tls-certificates">X.509 TLS Certificates</h5><p>All identified TAG-53 domains were found to host corresponding X.509 TLS certificates provided by Lets Encrypt, an example of which is shown in Figure 3. The prevalent use of Lets Encrypt TLS certificates allows for further correlations between TAG-53 domains and infrastructure, strengthening the clustering of this activity.</p><p><img src="https://cms.recordedfuture.com/uploads/exposing_tag_53_credential_harvesting_infrastructure_for_russia_aligned_espionage_operations_figure_3_0c8dfcf51e.png" alt="exposing_tag_53_credential_harvesting_infrastructure_for_russia_aligned_espionage_operations_figure_3.png"></p><p><strong>Figure 3: Partial X.509 TLS certificate for drive-globalordnance[.]com (Source: <a href="https://crt.sh/?id=7672587577">crt.sh</a>)</strong></p><h5 id="targeting-and-victimology">Targeting and Victimology</h5><p>Of the 38 discovered domains, 9 contained references to potential target organizations or organizations that TAG-53 may be attempting to masquerade as, shown in Table 2. The reason behind the use of these themed domains is not fully understood beyond the likely attempt to emulate real entities in order to appear more legitimate to potential targets and victims.</p><table>    <tbody>      <tr>        <td style="background-color:#000000;color:#ffffff;">TAG-53 Domain</td>        <td style="background-color:#000000;color:#ffffff;">Suspected Target/Masquerade</td>        <td style="background-color:#000000;color:#ffffff;">Industry Vertical</td>      </tr>      <tr>        <td>umopl-drive[.]com</td>        <td>UMO Poland </td>        <td>Aerospace and Defense: Hardware/Weaponry</td>      </tr>      <tr>        <td>drive-globalordnance[.]com</td>        <td>Global Ordnance</td>        <td>Aerospace and Defense: Hardware/Weaponry</td>      </tr>      <tr>        <td>sangrail-share[.]com</td>        <td>Sangrail LTD</td>        <td>Aerospace and Defense: Military & Civilian Intelligence</td>      </tr>      <tr>        <td>dtgruelle-us[.]com</td>        <td rowspan="2">DTGruelle</td>        <td rowspan="2">Logistics</td>      </tr>      <tr>        <td>dtgruelle-drive[.]com</td>      </tr>      <tr>        <td>cija-docs[.]com </td>        <td>The Commission for International Justice and Accountability (CIJA)</td>        <td>NGO: Armed Conflict Crime Investigations</td>      </tr>      <tr>        <td>blueskynetwork-shared[.]com</td>        <td>Blue Sky Network</td>        <td>Telecommunications: Satelite</td>      </tr>      <tr>        <td>dns-mvd[.]ru</td>        <td rowspan="2">The Ministry of Internal Affairs of the Russian Federation (MVD)</td>        <td rowspan="2">Government: Russian Ministry of Internal Affairs</td>      </tr>      <tr>        <td>mvd-redir[.]ru</td>      </tr>    </tbody>    </table>    <br /><p><strong>Table 2: Suspected targets/masquerades of TAG-53 linked domains (Source: Recorded Future)</strong></p><p>Analysis of the 9 domains reveals that 7 share a focus around industry verticals that would likely be of interest to Russia-nexus threat groups, especially in light of the war in Ukraine. The 2 outlier domains are probably intended to masquerade as the Ministry of Internal Affairs of the Russian Federation. (MVD)</p><h5 id="credential-harvesting">Credential Harvesting</h5><p>The TAG-53 domain drive-globalordnance[.]com includes a spoofed sign-in page for the legitimate company Global Ordnance, a military weapons and hardware supplier in the US. The spoofed sign-in page, shown in Figure 4, uses Global Ordnance branding and is suspected to be used for follow-on credential harvesting after a target has been phished. It is unclear whether Global Ordnance is the intended target of this attempted credential harvesting operation or whether TAG-53 is using a Global Ordnance-styled domain and spoofed sign-in page to masquerade as a legitimate entity to target victims.</p><p><img src="https://cms.recordedfuture.com/uploads/exposing_tag_53_credential_harvesting_infrastructure_for_russia_aligned_espionage_operations_figure_4_aa075fc12f.png" alt="exposing_tag_53_credential_harvesting_infrastructure_for_russia_aligned_espionage_operations_figure_4.png"></p><p><strong>Figure 4: TAG-53 Global Ordnance spoofed sign-in page (Source: URLScan)</strong></p><h4 id="mitigations">Mitigations</h4><p>Users should conduct the following measures to detect and mitigate activity associated with TAG-53:</p><ul><li>Configure your intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defense mechanisms in place to alert on  and upon review, consider blocking connection attempts to and from  the external IP addresses and domains listed in the appendix.</li><li>Recorded Future proactively detects malicious server configurations and provides means to block them in the Command and Control Security Control Feed. The Command and Control Feed includes tools used by TAG-53 and other Russian state-sponsored threat activity groups. Recorded Future clients should alert on and block these C2 servers to allow for detection and remediation of active intrusions.</li><li>Recorded Future <a href="https://www.recordedfuture.com/platform/threat-intelligence">Threat Intelligence (TI)</a>, <a href="https://www.recordedfuture.com/platform/third-party-intelligence">Third-Party Intelligence</a>, and <a href="https://www.recordedfuture.com/platform/secops-intelligence">SecOps Intelligence</a> modules users can monitor real-time output from Network Intelligence analytics to identify suspected targeted intrusion activity involving your organization or key vendors and partners.</li><li>Monitor for domain abuse, such as typosquat domains spoofing your organization, through the Recorded Future <a href="https://www.recordedfuture.com/platform/brand-intelligence">Brand Intelligence (BI)</a> module. The SecurityTrails extension is available to any customer that has a subscription to the Threat Intelligence or Brand Intelligence modules. The LogoType source and alerting is exclusive to the BI module, though the TI module does have access to the data via the Advanced Query Builder.</li><li>Recorded Futures Fraudulent Domains and Typosquats playbook explains triaging typosquatting or similar domain alerts. If you have not yet set up your alerts, see activating certified alerts in the Intelligence Goals Library.</li></ul><h4 id="outlook">Outlook</h4><p>Insikt Group continues to track TAG-53 infrastructure and observe changes in TTPs as the groups credential harvesting operations diversify. Notably, a consistent trend has emerged regarding the use of specifically tailored infrastructure by TAG-53 highlighting the long-term use of similar techniques for their strategic campaigns.</p><p>Readers should detect, block, and hunt for the indicators referenced in connection with TAG-53 reporting via the Recorded Future Platform in network monitoring, intrusion detection systems, firewalls, and any associated perimeter security appliances.</p><h4 id="appendix-a--indicators">Appendix A  Indicators</h4><h6 id="domains">Domains</h6><p>access-confirmation[.]com<br />allow-access[.]com<br />antibots-service[.]com<br />blueskynetwork-shared[.]com<br />botguard-checker[.]com<br />botguard-web[.]com<br />challenge-identifier[.]com<br />checker-bot[.]com<br />cija-docs[.]com<br />cloud-safety[.]online <br />cloud-us[.]online <br />dns-cache[.]online <br />dns-cookie[.]com<br />dns-mvd[.]ru <br />docs-web[.]online <br />drive-control[.]com<br />drive-globalordnance[.]com<br /> drive-previewer[.]com<br />drive-us[.]online <br />dtgruelle-drive[.]com<br />dtgruelle-us[.]com<br />encompass-shared[.]com<br />filter-bot[.]com<br />goweb-protect[.]com<br />guard-checker[.]com<br />land-of-service[.]com<br />live-identifier[.]com<br />mvd-redir[.]ru <br />network-storage-ltd[.]com<br />nonviolent-conflict-service[.]com<br />proxycrioisolation[.]com<br />redir-document[.]com<br />response-filter[.]com<br />response-redir[.]com<br />sangrail-share[.]com<br />share-drive-ua[.]com<br />transfer-record[.]com<br />umopl-drive[.]com </p><h6 id="ip-addresses">IP Addresses</h6><p>23[.]254[.]201[.]243<br /> 45[.]66[.]248[.]9 <br />45[.]86[.]230[.]198 <br />45[.]153[.]229[.]79 <br />64[.]44[.]101[.]31 <br />77[.]91[.]126[.]16 <br />77[.]91[.]126[.]35 <br />77[.]91[.]126[.]46 <br />77[.]91[.]126[.]62 <br />77[.]91[.]126[.]64 <br />77[.]91[.]126[.]66 <br />77[.]91[.]126[.]69 <br />77[.]91[.]69[.]109 <br />85[.]239[.]53[.]210 <br />85[.]239[.]60[.]18 <br />85[.]239[.]61[.]49 <br />85[.]239[.]61[.]86 <br />138[.]124[.]187[.]143 <br />138[.]124[.]187[.]222 <br />142[.]11[.]209[.]171 <br />142[.]11[.]209[.]180 <br />142[.]11[.]210[.]53 <br />146[.]19[.]230[.]182 <br />146[.]59[.]102[.]76 <br />185[.]164[.]172[.]128 <br />185[.]164[.]172[.]220 <br />185[.]179[.]188[.]73 <br />185[.]179[.]189[.]32 <br />185[.]179[.]189[.]43 <br />185[.]179[.]189[.]45 <br />192[.]119[.]65[.]114 <br />192[.]119[.]97[.]190 <br />192[.]119[.]112[.]249 <br />192[.]129[.]154[.]225 <br />192[.]236[.]195[.]114 <br />192[.]236[.]193[.]194 <br />193[.]200[.]17[.]102 <br />195[.]246[.]110[.]45</p><h4 id="appendix-b--mitre-attck-techniques">Appendix B  Mitre ATT&amp;CK Techniques</h4><table>        <tbody>          <tr>            <td style="background-color:#000000;color:#ffffff;">Tactic: Technique</td>            <td style="background-color:#000000;color:#ffffff;">ATT&CK Code</td>          </tr>          <tr>            <td><b>Defense Evasion:</b> Masquerading</td>            <td>T1036</td>          </tr>          <tr>            <td><b>Reconnaissance:</b> Phishing for Information</td>            <td>T1598</td>          </tr>          <tr>            <td><b>Resource Development:</b> Stage Capabilities</td>            <td>T1608</td>          </tr>        </tbody>        </table>        <br />]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2022_1202_Blog_Intelligence_Report_Main_Feature_bd18c12b17.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Suspected Iran-Nexus TAG-56 Uses UAE Forum Lure for Credential Theft Against US Think Tank]]></title>
            <link>https://www.recordedfuture.com/suspected-iran-nexus-tag-56-uses-uae-forum-lure-for-credential-theft-against-us-think-tank</link>
            <guid>https://www.recordedfuture.com/suspected-iran-nexus-tag-56-uses-uae-forum-lure-for-credential-theft-against-us-think-tank</guid>
            <pubDate>Tue, 29 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group® reports on the tactics, techniques, and procedures (TTPs) used by TAG-56 in their recent targeting of a DC-based think tank.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: <a href="https://go.recordedfuture.com/hubfs/reports/cta-2022-1129.pdf">Click here</a> to download the report as a PDF.</em></p><p>This report covers threat activity that is highly likely related to a broader campaign led by a suspected Iran-nexus threat activity group, TAG-56. Insikt Group discovered this threat activity via threat-hunting techniques. This research is pertinent to individuals and organizations that cover Iranian cyber operations, IT security employees, members of think tanks, non-governmental organizations, journalists, and governments.</p><h4 id="executive-summary">Executive Summary</h4><p>In early November 2022, Insikt Group identified a phishing and follow-on credential theft attack highly likely led by an Iran-nexus threat activity group directed against the US-based Washington Institute think tank. The credential theft component masquerades as a Microsoft registration form for the 2022 Sir Bani Yas Forum hosted by the government of the United Arab Emirates (UAE). The threat activity is highly likely indicative of a broader campaign that makes use of URL shorteners to direct victims to malicious pages where credentials are stolen. This tradecraft is common among Iran-nexus advanced persistent threat (APT) groups like APT42 and Phosphorus.</p><p>Insikt Group identified 5 domains highly likely used to host credential theft pages. The credential theft examples associated with this research were submitted to urlscan throughout 2022. The most recent submission was from the UAE on November 3, 2022. As of this writing, it is highly likely that this threat activity is related to an ongoing campaign. Insikt Group tracks this activity under the temporary group designator TAG-56.</p><h4 id="threat-analysis">Threat Analysis</h4><h5 id="initial-discovery">Initial Discovery</h5><p>On November 3, 2022, Insikt Group identified a suspicious urlscan submission from a user in the UAE that returned a fake Microsoft registration form for the 2022 Sir Bani Yas Forum as noted in Figure 1. The intended target of the attack is a senior fellow of the Washington Institute, a US-based think tank focused on US foreign policy in the Near East. The submission data revealed that the victim likely received a spearphishing message that, when clicked, would redirect them to a URL with the apex domain name  mailer-daemon[.]net  where the spoofed registration page is hosted.</p><p><img src="https://cms.recordedfuture.com/uploads/suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_1_f8743989cb.png" alt="suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_1.png"></p><p><strong>Figure 1: Registration form purporting to be linked to the Sir Bani Yas Forum (Source: urlscan)</strong></p><p>The domain mailer-daemon[.]net was registered on October 11, 2022, via Namecheap and uses WHOIS privacy protection. The domain has resolved to 162.0.232[.]252 since October 11, 2022. The reverse DNS for 162.0.232[.]252 is web-hosting[.]com, which is associated with Namecheap&#39;s shared hosting services. </p><p>Insikt Group identified 4 further domains, listed in Table 1 below, which use an identical domain naming convention as mailer-daemon[.]net. All but 1 domain, mailer-daemon[.]org, use Namecheap&#39;s shared hosting services. The domain mailer-daemon[.]org was registered using GoDaddy. Open-source reporting <a href="https://noticeofpleadings.com/phosphorus/files/Motion%20for%20Temporary%20Sealing/2020-07-17%20ECF%2041-3%20-%20Microsoft%20Phosphorus%204th%20Supp%20TRO%20Proposed%20Order.pdf">reveals</a> similar domains, specifically mailerdaemon[.]me  and mailer-daemon-message[.]co, were used by members of the Phosphorus APT group to lead attacks throughout 2020 and 2021.</p><table><tbody>  <tr>    <td style="background-color:#000000;color:#ffffff;">Domain</td>    <td style="background-color:#000000;color:#ffffff;">IP Address</td>    <td style="background-color:#000000;color:#ffffff;">First Seen</td>    <td style="background-color:#000000;color:#ffffff;">Registrar</td>    <td style="background-color:#000000;color:#ffffff;">WHOIS Registration</td>  </tr>  <tr>    <td>mailer-daemon[.]online</td>    <td>198.54.115[.]217</td>    <td>23 November 2022</td>    <td>Namecheap</td>    <td>Privacy Protected</td>  </tr>  <tr>    <td>mailer-daemon[.]org</td>    <td>92.205.13[.]202</td>    <td>13 November 2022</td>    <td>GoDaddy</td>    <td>Privacy Protected</td>  </tr>  <tr>    <td>mailer-daemon[.]net</td>    <td>162.0.232[.]252</td>    <td>11 October 2022</td>    <td>Namecheap</td>    <td>Privacy Protected</td>  </tr>  <tr>    <td>mailer-daemon[.]me</td>    <td>199.188.200[.]217</td>    <td>31 May 2022</td>    <td>Namecheap</td>    <td>Privacy Protected</td>  </tr>  <tr>    <td>mailer-daemon[.]live</td>    <td>199.188.200[.]217</td>    <td>9 November 2021</td>    <td>Namecheap</td>    <td>Privacy Protected</td>  </tr></tbody></table><br /> <p><strong>Table 1: Domain names associated with TAG-56 threat activity (Source: Recorded Future)</strong></p><h6 id="the-fake-url-shortener">The Fake URL Shortener</h6><p>A fake URL shortener, tinyurl[.]ink, which spoofs the legitimate service TinyURL (tinyurl[.]com), was identified as part of our research. The fake URL shortener was used to <a href="https://urlscan.io/result/92e455f5-e1fd-449e-a189-951cef0072fa">deliver</a> a lure document  Iran nuke.docx  titled &quot;ANOTHER FLAWED IRAN DEAL AND THE NEXT PHASE OF US POLICY&quot;, which, as the title implies, concerns Iran&#39;s nuclear program. The document, shown in Figure 2, is benign and was likely used by the attackers to lower the precautionary behavior of the intended target. In a June 2022 report regarding an Iranian APT campaign that targeted US and Israeli government officials, Check Point Research <a href="https://research.checkpoint.com/2022/check-point-research-exposes-an-iranian-phishing-campaign-targeting-former-israeli-foreign-minister-former-us-ambassador-idf-general-and-defense-industry-executives">noted</a> that benign documents were sent to targets to initiate conversations.</p><p><img src="https://cms.recordedfuture.com/uploads/suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_2_55c79b8ba0.png" alt="suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_2.png"></p><p><strong>Figure 2: Decoy document sent to intended targets (Source: <a href="https://tria.ge/221103-3r6c9sgha7/behavioral1">Tria.ge</a>)</strong></p><p>As part of the delivery of Iran nuke.docx, TAG-56 operatives used the fake URL shortener in conjunction with the legitimate shortening service tinyurl[.]com as depicted in Figure 3. The attack chain started with the operatives delivering a message using the legitimate URL shortener (tinyurl[.]com) against a suspected target; if the target clicked on the link, they were redirected to the spoofed equivalent (tinyurl[.]ink). Another <a href="https://urlscan.io/result/f36be5fd-7b56-4d1a-9346-0cf75cabeb8d">submission</a> to urlscan from Israel revealed that TAG-56 used tinyurl[.]com to engage with a suspected target using the mailer-daemon[.]live domain. At the time of analysis, mailer-daemon[.]live resolved to another IP address owned by Namecheap: 198.54.116[.]118.</p><p><img src="https://cms.recordedfuture.com/uploads/suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_3_83ea38c5ee.png" alt="suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_3.png"></p><p><strong>Figure 3: Observed redirects to Iran nuke document (Source: Recorded Future)</strong></p><p>We do not know how TAG-56 disseminated any of the links associated with this research, although it is highly likely that spearphishing, or potentially an encrypted chat platform, was used for delivery. Some Iran-nexus operators, such as those associated with APT42, have been known to send links directly to victims&#39; WhatsApp or Telegram accounts and engage in chats to manipulate them through social engineering.</p><table>    <tbody>      <tr>        <td style="background-color:#000000;color:#ffffff;">File Name</td>        <td style="background-color:#000000;color:#ffffff;">SHA256 Hash</td>        <td style="background-color:#000000;color:#ffffff;">URL</td>        <td style="background-color:#000000;color:#ffffff;">Last Modified</td>      </tr>      <tr>        <td>Iran nuke.docx</td>        <td>69eb4fca412201039105d86<br />2d5f2bf12085d41cb18a933<br />98afef0be8dfb9c229</td>        <td>hxxps[:]//tinyurl[.]ink/8tio97cy/Iran%20nuke.docx</td>        <td>28 February 2022</td>      </tr>    </tbody>    </table>    <br /><p><strong>Table 2: Information associated with Iran nuke.docx file (Source: Recorded Future and urlscan)</strong></p><p>As noted in Table 3, the domain tinyurl[.]ink has resolved to IP address 199.188.200[.]217 since it was registered via Namecheap in mid-December 2021; WHOIS privacy protections were again employed by TAG-56 operators.</p><table>    <tbody>      <tr>        <td style="background-color:#000000;color:#ffffff;">Domain</td>        <td style="background-color:#000000;color:#ffffff;">IP Address</td>        <td style="background-color:#000000;color:#ffffff;">First Seen</td>        <td style="background-color:#000000;color:#ffffff;">WHOIS Registration</td>      </tr>      <tr>        <td>tinyurl[.]ink</td>        <td>199.188.200[.]217</td>        <td>12 December 2021</td>        <td>Privacy Protected</td>      </tr>    </tbody>    </table>    <br /><p><strong>Table 3: URL Shortener has been operational since mid-December 2021 (Recorded Future)</strong></p><h6 id="server-configuration">Server Configuration</h6><p>The Namecheap server configuration of tinyurl[.]ink <a href="https://research.checkpoint.com/2022/check-point-research-exposes-an-iranian-phishing-campaign-targeting-former-israeli-foreign-minister-former-us-ambassador-idf-general-and-defense-industry-executives">revealed</a> another notable overlap to threat activity reported by Check Point Research: the attackers used a shared web host provided by Namecheap to establish their infrastructure, an aspect of TAG-56s tactics, techniques, and procedures (TTPs) that was also observed in the campaign reported by Check Point Research. In that campaign, the attacker-controlled infrastructure also included a fake URL shortener, litby[.]us. This suggests that TAG-56 operators prefer to acquire purpose-built infrastructure as opposed to establishing their own.</p><p>Check Point Researchers also <a href="https://research.checkpoint.com/2022/check-point-research-exposes-an-iranian-phishing-campaign-targeting-former-israeli-foreign-minister-former-us-ambassador-idf-general-and-defense-industry-executives">cited</a> that the HTML of the URL shortener (litby[.]us) revealed direct links to a cluster of threat activity <a href="https://blogs.microsoft.com/on-the-issues/2020/10/28/cyberattacks-phosphorus-t20-munich-security-conference">attributed</a> to the Phosphorus APT in 2020. The domain de-ma[.]online  underlined in Figure 4 has not had an active DNS A record since November 2020.</p><p><img src="https://cms.recordedfuture.com/uploads/suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_4_1b2d79fa91.png" alt="suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_4.png"></p><p><strong>Figure 4: HTML code revealing links to de-ma[.]online domain (Source: <a href="https://research.checkpoint.com/2022/check-point-research-exposes-an-iranian-phishing-campaign-targeting-former-israeli-foreign-minister-former-us-ambassador-idf-general-and-defense-industry-executives">Check Point Research</a>)</strong></p><p>Insikt Group identified the likely reuse of code in the HTML of the Sir Bani Yas spoofed registration page. A JavaScript function specifically lists a variable &quot;<code>passwd.trim()==&quot;SaudiG20</code>&quot;, which is likely not related to the Sir Bani Yas forum and is more likely associated with the G20 meeting hosted by Saudi Arabia in 2020.</p><p><img src="https://cms.recordedfuture.com/uploads/suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_5_694f9028d4.png" alt="suspected_iran_nexus_tag_56_uses_uae_forum_lure_for_credential_theft_against_us_think_tank_figure_5.png"></p><p><strong>Figure 5: Investigation of HTML revealed &quot;SaudiG20&quot; variable in a JavaScript function (Source: urlscan)</strong></p><p>The Sir Bani Yas forum spoofed login page also contained a <a href="https://urlscan.io/result/553a019d-f3fa-4c46-abe8-06aefe633b0b/#redirects">redirect</a> that included the string &quot;<code>continue-to-settings.php</code>&quot;. The same string was identified in another submission made to urlscan on August 6, 2021. This <a href="https://urlscan.io/result/5701e314-0218-4fc4-804e-ce9d64e3c86f/#summary">submission</a> revealed a malicious login page for Yahoo mail (another case of credential theft), but the apex domain used for the attack was continuetogo[.]me. This domain was <a href="https://blog.google/threat-analysis-group/countering-threats-iran">referenced</a> in a report by Googles Threat Analysis Group in October 2021 and is associated with APT35. Threat researchers from multiple cybersecurity vendors have previously <a href="https://cyware.com/news/charming-kitten-apt-adds-new-tools-and-tactics-to-its-arsenal-90a5f2fc">revealed</a> <a href="https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/old-cat-new-tricks.html">strategic</a> and <a href="https://vblocalhost.com/uploads/VB2021-Haeghebaert.pdf">technical</a> <a href="https://tweetdeck.twitter.com/ChicagoCyber/status/1567552130248056833/photo/1">overlaps</a> between APT35, Charming Kitten, TA453, and APT42 (along with its forerunner UNC788).</p><table>    <tbody>      <tr>        <td>hxxps[:]//continuetogo[.]me/Sec=Tab=settings/id=xxxxx=xxxxx/continue-to-settings.php<br />            hxxps[:]//mailer-daemon[.]net/file=sharing=system/file.id.X=xxxxxx/continue-to-settings.php</td>      </tr>    </tbody>    </table>    <br /><p><strong>Figure 6: Overlaps between 2 separate campaigns linked to APT35 (attributed by Google) and TAG-56 (Source: urlscan)</strong></p><h4 id="mitigations">Mitigations</h4><ul><li>Establish robust policies and carry out social engineering and anti-phishing awareness exercises to help detect and prevent attacks.</li><li>Use strong passwords and enable multi-factor authentication (MFA) where possible to limit the potential damage of credential theft.</li><li>Monitor for domain abuse, such as typosquat domains spoofing your organization, through the Recorded Future <a href="https://www.recordedfuture.com/platform/brand-intelligence">Brand Intelligence (BI)</a> module. The SecurityTrails extension is available to any customer that has a subscription to the Threat Intelligence (TI) or BI modules. The LogoType source and alerting is exclusive to the BI module, though the TI module does have access to the data via the Advanced Query Builder.</li><li>Cold-calling is a common method Iranian social engineering operators use to engage with victims. This includes direct messaging on social media platforms as well as on encrypted chats. Be on the lookout for signs of inauthentic or reused material and attempt to directly verify with the source when possible.</li><li>Recorded Futures Fraudulent Domains and Typosquats playbook explains triaging typosquatting or similar domain alerts. If you have not yet set up your alerts, see activating certified alerts in the Intelligence Goals Library.</li></ul><h4 id="outlook">Outlook</h4><p>TAG-56 depicts many of the known TTPs associated with groups like APT42 and Phosphorus. This includes the domain naming conventions associated with attacker-controlled infrastructure, the use of recycled code, and the intended victim of the credential theft operation. The use of recycled HTML code is presumably a recurrent aspect of TAG-56&#39;s tradecraft, which notwithstanding the increased chance of detection by threat researchers, is still likely providing the attackers sufficient return on investment to not warrant a shift in TTPs.</p><p>The victimology of the threat activity associated with APT42 and Phosphorus is widely reported in open sources (<a href="https://www.mandiant.com/media/17826">1</a>, <a href="https://vblocalhost.com/uploads/VB2021-Haeghebaert.pdf">2</a>, <a href="https://blogs.microsoft.com/on-the-issues/2020/10/28/cyberattacks-phosphorus-t20-munich-security-conference">3</a>), as think tanks provide strategic-level information of intelligence value to their presumed handlers. The targeting overlap identified with TAG-56 supports our assessment that this threat cluster has strong overlaps with the aforementioned APT groups.</p><h4 id="appendix">Appendix</h4><h6 id="domains">Domains:</h6><p>mailer-daemon[.]netmailer-daemon[.]onlinemailer-daemon[.]memailer-daemon[.]orgmailer-daemon[.]livede-ma[.]onlinetinyurl[.]inklitby[.]us</p><h6 id="ip-addresses">IP Addresses:</h6><p>92.205.13[.]202162.0.232[.]252198.54.116[.]118198.54.115[.]217199.188.200[.]217</p><h6 id="urls">URLs:</h6><p>hxxps[:]//mailer-daemon[.]net/file=sharing=system/file.id.x=xxxxxx/first.check.htmlhxxps[:]//continuetogo[.]me/Sec=Tab=settings/id=xxxxx=xxxxx/continue-to-settings.phphxxps[:]//mailer-daemon[.]net/file=sharing=system/file.id.X=xxxxxx/continue-to-settings.phphxxps[:]//mailer-daemon[.]live/sec=file=sharing/check.id=xxxxxxxx=xxxxxx/index.phphxxps[:]//tinyurl[.]ink/8tio97cy/Iran%20nuke.docx</p><h6 id="sha256-hash">SHA256 Hash:</h6><p>69eb4fca412201039105d862d5f2bf12085d41cb18a93398afef0be8dfb9c229</p><h6 id="file">File:</h6><p>Iran nuke.docx</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2022_1128_Blog_Intelligence_Report_Main_Feature_23915f7c4e.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Despite US Sanctions, Large-Scale Belt and Road Initiative Project in Cambodia Forges Ahead ]]></title>
            <link>https://www.recordedfuture.com/despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead</link>
            <guid>https://www.recordedfuture.com/despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead</guid>
            <pubDate>Tue, 29 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[The 99-year development plan of Dara Sakor Seashore Resort, and work underway, indicates it may become a Chinese military asset to expand its power in SE Asia. ]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em>Editors Note: To read the entire analysis with footnotes, <a href="https://go.recordedfuture.com/hubfs/reports/ta-2022-1129.pdf">click here</a> to download the report as a PDF.</em></p><p>This report uses the Recorded Future Platform, satellite imagery, Chinese and Cambodian news sources, corporate records, and other publicly available information to assess progress on a Belt and Road Initiative (BRI) project in Cambodia that is led by a United States (US)-sanctioned company. This report specifically focuses on the development of this project since early 2018, when a report by the Center for Advanced Defense Studies (C4ADS) <a href="https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5ad5e20ef950b777a94b55c3/1523966489456/Harbored+Ambitions.pdf">documented</a> its then-current state, and since September 2020, when the US sanctioned the developer. This report will be of most interest to policymakers, journalists, and researchers interested in understanding developments along the BRI, China-led development in Cambodia, and the effects of American sanctions. Information about the author, Devin Thorne, can be found at the end of this report.</p><h4 id="executive-summary">Executive Summary</h4><p>US sanctions have failed to stop the development of new tourist facilities, basic infrastructure, and an international airport in a large-scale Belt and Road Initiative project in Cambodia. The project, known as the <a href="https://thepeoplesmap.net/project/cambodia-china-comprehensive-investment-and-development-pilot-zone-dara-sakor-seashore-resort">CambodiaChina Comprehensive Investment and Development Pilot Zone and Dara Sakor Seashore Resort</a> (; hereafter, the Pilot Zone), began in 2008 and <a href="https://archive.ph/PvqZd">became</a> part of the Belt and Road Initiative in 2016. The Pilot Zone was originally led by the now-sanctioned Cambodia-based project lead, Union Development Group (UDG Cambodia; ;     ), a close affiliate or subsidiary of China-based developer Tianjin Union Development Group (UDG Tianjin; ). Yet, in spite of US sanctions, development continues under a new company created in 2018 amid rising negative press and under new branding adopted after UDG Cambodia was sanctioned in late 2020. The new company and brand are almost certainly still closely linked to the original developers.</p><p>Around the time when UDG Cambodia was <a href="https://home.treasury.gov/news/press-releases/sm1121">sanctioned</a>, a major concern expressed by the US Treasury Department and other parts of the US government was the potential of the project to host Chinese military assets or even <a href="https://archive.ph/ztjHP">become</a> a military base. There is no specific evidence the Pilot Zone is being shaped for military purposes and not even the first of 3 planned ports that could support Chinese warships is completed, making it unlikely to have such a function in the near future. However, China <a href="https://direct.mit.edu/isec/article-abstract/46/4/9/111175/Pier-Competitor-China-s-Power-Position-in-Global?redirectedFrom=fulltext">uses</a> commercial ports and port-city projects developed by Chinese companies to project naval power far from Chinas shores. Given the Pilot Zones broad scope  <a href="http://www.coastalcitygroup.net">including</a> tourist resorts, <a href="https://archive.ph/GA9jL">industry parks</a>, medical facilities, and ports and an international airport large <a href="https://www.ft.com/content/23968248-43a0-11e6-b22f-79eb4891c97d">enough</a> to <a href="https://archive.ph/J9Wck">accommodate</a> military assets  and 99-year development timeline, it is prudent to monitor the projects continuing progress.</p><h4 id="key-judgments">Key Judgments</h4><ul><li>Despite US sanctions, construction and other forms of development continue within the Pilot Zone, particularly at tourist attractions such as new shopping districts and the Dara Sakor International Airport.</li><li>Since early 2018, development in the zone has also focused on basic infrastructure such as establishing power and telecommunications and setting up partnerships to advance the non-tourism aspects of the Pilot Zone. </li><li>In addition to a 10,000-ton pier (port) for cruise liners and commercial goods that is said to be completed (though it almost certainly is not), plans for the Pilot Zone now include 2 additional ports, 1 of which will reportedly accommodate 100,000-ton vessels.</li><li>In mid-2018, a new company in the UDG family was created and now likely leads development of the Pilot Zone; originally called Union City Development Group Co. Ltd., this company adopted a new name  Coastal City Development Group Co.  after UDG Cambodia was sanctioned.</li><li>Although the Pilot Zone is not overtly designed to provide logistical support to Chinas military, this potential cannot be dismissed as Chinese analysts continue espousing the use of commercial port and port-city developments to facilitate Chinas power projection.</li></ul><h4 id="a-controversial-project">A Controversial Project</h4><h5 id="sanctions-and-corruption">Sanctions and Corruption</h5><p>From the size of the land concession on which it sits, to the developers treatment of local residents, to environmental concerns, the Pilot Zone has been stalked by controversy for over a decade. At 45,100 <a href="https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5ad5e20ef950b777a94b55c3/1523966489456/Harbored+Ambitions.pdf">hectares</a>, the Pilot Zone constitutes 20% of Cambodias coastline and is 4.5 times the legal size of economic land concessions in Cambodia. Cambodian officials and international human rights bodies have <a href="https://archive.ph/UjFqW">expressed</a> <a href="https://home.treasury.gov/news/press-releases/sm1121">concern</a> about land disputes with Cambodians living in the zone. The US Treasury Department sanctioned project developer UDG Cambodia in September 2020 under the Global Magnitsky Human Rights Accountability Act, though some analysts <a href="https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/220614_Poling_Pariah_Partner.pdf?KmblgE_l1bKt42yaWwkrvRaw82aoIwdn">argue</a> this was primarily motivated by a desire to punish Cambodia for strategic alignment with China rather than concern about human rights. Regardless, the company remains sanctioned today (see <strong>Figure 2</strong>).</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_1_f27a386449.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-1.png"></p><p><strong>Figure 1: The Pilot Zone and surrounding transport corridors (Source: <em><a href="https://archive.ph/KGDOQ">BeyondRealty Asia</a></em>)</strong></p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_2_549b228f0b.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-2.png"></p><p><strong>Figure 2: UDG Cambodia listed in the Specially Designated Nationals and Blocked Persons list administered by the Office of Foreign Assets Control of the US Treasury Department, accessed July 2022 (Source: <a href="https://sanctionssearch.ofac.treas.gov">OFAC</a>)</strong></p><p>Cambodian law <a href="https://opendevelopmentcambodia.net/topics/concessions/#return-note-73837-44">limits</a> economic land concessions to 10,000 hectares and stipulates that the same person or legal entity cannot hold several concessions that total more than 10,000 hectares. Moreover, economic land concessions are only supposed to be <a href="https://opendevelopmentcambodia.net/topics/state-private-land">granted</a> from state private land. The Pilot Zones creation circumvented both of these requirements. Not only is the zone overlarge, it includes a portion of Cambodias Botum Sakor National Park that was <a href="https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5ad5e20ef950b777a94b55c3/1523966489456/Harbored+Ambitions.pdf">converted</a> into concession-eligible land by a royal decree. Some sources <a href="https://cambodia.ohchr.org/~cambodiaohchr/sites/default/files/news/WebDOCs/2012/SR_report_on_ELC_Eng.pdf">say</a> the entirety of the original 36,000 hectares was carved from Botum Sakor National Park, driving concerns about <a href="https://www.policyforum.net/deforestation-in-cambodia">deforestation</a> in relation to the Pilot Zones development.</p><p>How UDG Tianjin and UDG Cambodia managed to secure an economic land concession flouting both of the restrictions discussed above is unclear. When the US Treasury Department sanctioned UDG Cambodia, it <a href="https://home.treasury.gov/news/press-releases/sm1121">asserted</a> the company had manipulated its corporate identity as described above to acquire the Pilot Zones land. This manipulation was first <a href="https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5ad5e20ef950b777a94b55c3/1523966489456/Harbored+Ambitions.pdf">documented</a> in a public report by former C4ADS analysts Devin Thorne and Ben Spevack. Using Cambodian corporate records, they showed how UDG Cambodia was initially registered as a foreign-owned Chinese firm but changed its status to that of a domestic Cambodian firm 1 year prior to signing the Pilot Zones lease agreement with the Cambodian government. After the lease agreement was concluded, UDG Cambodia issued 1,000 shares valued at $1,000 USD each. All of these were purchased by UDG Tianjin in China. UDG Cambodias chairperson at the time, a Cambodian national, was also replaced by a Chinese national with ties to UDG Tianjins parent company. However, Thorne and Spevack noted that the purpose of this manipulation was unclear, given that there is no exception for Cambodian-owned businesses regarding the 10,000-hectare limit on economic land concessions.</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_3_9cef16362c.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-3.png"></p><p><strong>Figure 3: Changes to the corporate record of UDG Cambodia (Source: <a href="https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5ad5e20ef950b777a94b55c3/1523966489456/Harbored+Ambitions.pdf">C4ADS</a>)</strong></p><p>In 2012, a report submitted to the United Nations General Assembly (UNGA) on the human rights situation in Cambodia by a Special Rapporteur on the situation of human rights in Cambodia <a href="https://cambodia.ohchr.org/~cambodiaohchr/sites/default/files/news/WebDOCs/2012/SR_report_on_ELC_Eng.pdf">expressed</a> concern over treatment of local citizens living within the Pilot Zone. It documents the relocation of approximately 1,000 families and the struggles they faced after relocation, including limited options for generating income and poor compensation for their repurposed land. It states that UDG Cambodia hired guards to control access to villages from which some residents refused to relocate. In 2015, such guards reportedly <a href="https://www.phnompenhpost.com/national/villagers-file-complaint-against-union-development-group-razing-crops-property">burned</a> crops and homes built by people on seemingly unused land. As late as 2017, the company reportedly <a href="https://www.phnompenhpost.com/national/chinese-firm-builds-fence-around-koh-kong-elc-while-families-refuse-move">constructed</a> fences around properties owned by a small number of residents still resisting relocation. In 2019, the representatives of 140 displaced families <a href="https://www.phnompenhpost.com/national/chinese-embassy-petitioned">protested</a> outside of the Chinese Embassy, requesting promised compensation that they reportedly had yet to receive. As of October 2021, some Cambodian families were still <a href="https://www.rfa.org/english/news/cambodia/land-10142021160422.html">refusing</a> compensation for their land, believing the compensation amounts to be unfair. In November 2021, more than 1,000 families <a href="https://cambojanews.com/while-hundreds-sign-final-offer-for-decade-plus-koh-kong-land-dispute-holdouts-remain">agreed</a> to a compensation package, but some continued to express dissatisfaction.</p><p>The US Treasury Departments press release announcing sanctions on UDG Cambodia further <a href="https://home.treasury.gov/news/press-releases/sm1121">asserted</a> the company used Cambodian military forces to intimidate local villagers and to clear out land necessary for developing the Pilot Zone. These military forces and UDG Cambodia reportedly used violent means, despite calls by the Cambodian Council of Ministers and United Nations Office of the High Commissioner for Human Rights for the company to stop such activities. The US Treasury Departments announcement further asserts that use of Cambodian military personnel was arranged through General <a href="https://www.hrw.org/news/2020/10/22/cambodia-hun-sen-and-his-abusive-generals">Kun Kim</a>, a former high-ranking military leader who has also been <a href="https://home.treasury.gov/news/press-releases/sm849">sanctioned</a> by the US government. Both the 2012 report to the UNGA and US Treasury Departments press release also mention concerns regarding environmental degradation caused, or that could be caused, by the Pilot Zones development.</p><h5 id="potential-military-use">Potential Military Use</h5><p>A recurring question posed by <a href="https://warontherocks.com/2019/05/hiding-in-plain-sight-chinese-expansion-in-southeast-asia">foreign analysts</a>, <a href="https://www.nytimes.com/2019/12/22/world/asia/cambodia-china-military-bases.html">news media</a>, <a href="https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5ad5e20ef950b777a94b55c3/1523966489456/Harbored+Ambitions.pdf">C4ADSs report</a>, and the <a href="https://archive.ph/ztjHP">US government</a> related to the Pilot Zone is whether it could host Chinese military assets in the future or otherwise support Chinas military activities in Southeast Asia. There is no specific evidence that the Pilot Zone is being designed as a military base or for military use, and Cambodian <a href="https://www.voanews.com/a/cambodia-says-beijing-backed-project-will-not-include-chinese-naval-base/4662652.html">officials</a> <a href="https://www.voacambodia.com/a/claims-port-will-be-Chinese-naval-base-unfounded-officials-say/4661805.html">deny</a> that such is a possibility. Still, <a href="https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1005&context=cmsi-maritime-reports">theories</a> among military analysts in China regarding the role of commercial ports in extending Chinas military presence overseas and the characteristics of infrastructure in the Pilot Zone keep speculation alive  and make it prudent to keep an eye on the project. Adding fuel to such concerns, a likely Chinese military-model aerial drone was reportedly <a href="https://archive.ph/SXQ46">found</a> 7 kilometers outside of the Pilot Zone in January 2020.</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_4_82b4f139b2.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-4.png"></p><p><strong>Figure 4: Mentions of the Pilot Zone as tracked in the Recorded Future Platform (Source: Recorded Future)</strong></p><p>Concerns regarding whether the Pilot Zone could be used by the Chinese military are informed by the value of dual-use commercial port and port-city infrastructure in supporting the logistics needs (replenishment, personnel and equipment transfer, etc.) of Peoples Liberation Army Navy (PLAN) warships operating far from Chinas shores. A major concept in this line of thinking is strategic strongpoints (), which authoritative sources <a href="https://nuke.fas.org/guide/china/sms-2013.pdf">refer</a> to as locations that <a href="https://jamestown.org/program/strategic-strong-points-and-chinese-naval-strategy">provide</a> support for overseas military operations or act as a forward base for deploying military forces overseas. Researchers affiliated with the China Maritime Studies Institute <a href="https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1005&context=cmsi-maritime-reports">find</a> that strategic strongpoints are often marked by Chinese-led port projects involving commercial and infrastructure projects with dual-use functions that can enable both economic and military activities. Such dual-use strongpoints are situated in strategic locations, such as along sea lines of communication or near maritime chokepoints. An assessment in the Massachusetts Institute of Technologys <em>International Security</em> journal asserts that commercial port facilities <a href="https://direct.mit.edu/isec/article-abstract/46/4/9/111175/Pier-Competitor-China-s-Power-Position-in-Global?redirectedFrom=fulltext">enable</a> considerable military logistics and intelligence capabilities in peacetime, though their utility in wartime is uncertain.</p><p>Not all Chinese-led commercial or infrastructure projects are strategic strongpoints. Given the Pilot Zones current stage and state of development, it is unlikely to support PLAN operations in the short term. However, the Pilot Zones characteristics and long development timeline mean it could evolve to meet the logistics of Chinese naval operations in Southeast Asia, such as around the Malacca Strait and into the Indian Ocean. Analysis <a href="https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5ad5e20ef950b777a94b55c3/1523966489456/Harbored+Ambitions.pdf">highlighted</a> by C4ADS report from China-based <em>Journal of International Security Studies</em> (), described a first civilian, later military () approach to make [Chinese-owned] ports gradually possess the capability for offering logistical support to Chinese vessels and become Chinas strategic [strongpoints] in Southeast Asia to create an advantageous external environment for Chinas rise. Such an approach is seen in the multipurpose port and related infrastructure in Gwadar, Pakistan, which are being developed as part of the BRIs China-Pakistan Economic Corridor and are <a href="http://www.andrewerickson.com/wp-content/uploads/2020/08/CMSI_China-Maritime-Report_7_Gwadar-Chinas-Potential-Strategic-Strongpoint-in-Pakistan_Kardon-Kennedy-Dutton_20200801.pdf">viewed</a> by Chinese analysts as suited for evolution into a strategic strongpoint. Importantly, the Pilot Zone does not need to develop into a military base in the traditional sense to be useful for expanding the geographic scope of PLAN operations. Commercial ports can and have <a href="https://ndupress.ndu.edu/Portals/68/Documents/stratperspective/china/ChinaPerspectives-7.pdf">functioned</a> as pit stops to provide basic services such as refueling, provisioning, electrical power, and waste disposal for PLAN surface vessels.</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_5_182cab33c7.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-5.png"></p><p><strong>Figure 5: The Pilot Zone in relation to Ream Naval Base with proposed and actual port positions. The outline of the Pilot Zone is based on official marketing materials but is not authoritative (Source: Google Earth, December 2020; Created by Insikt Group)</strong></p><p>Highlighting Chinas likely assessment that Cambodias geographic position has strategic value, in June 2022 the Washington Post reported that China is <a href="https://www.washingtonpost.com/national-security/2022/06/06/cambodia-china-navy-base-ream">building</a> a naval facility for its exclusive use at Ream Naval Base in Preah Sihanouk province. The Pilot Zone is located roughly 35 nautical miles by sea and 180 miles by land from Ream Naval Base. When PLAN ships call at foreign ports, Chinese diplomatic missions and Chinese enterprises <a href="https://go.recordedfuture.com/hubfs/reports/ta-2022-0310.pdf">mobilize</a> to provide logistical support. While it is most likely that Chinese enterprises located in Sihanoukville would be enrolled to provide such support, it is also plausible that some general supply and equipment warehousing could occur in the Pilot Zone even if PLAN vessels call at Ream, or that companies from the zone could mobilize to provide support. Chinese military personnel have also <a href="https://ndupress.ndu.edu/Portals/68/Documents/stratperspective/china/ChinaPerspectives-7.pdf">noted</a> the role that commercial ports can play in accessing rest and entertainment and medical treatment, and the Pilot Zone will ultimately provide options for this type of activity regardless of where PLAN ships dock (if the zones development continues according to plan).</p><p>The Pilot Zones airport and ports are also large enough to support Chinese military assets, fueling concerns. Foreign analysts have <a href="https://archive.ph/J9Wck">observed</a> the Pilot Zones airport runway is about 3,400 meters long, which is larger than the international airport in Phnom Penh and could accommodate any plane in the Chinese air force. In fact, this is longer than Sihanouk International Airports runway and those of Chinas dual-use military airfields on Woody Island and on Fiery Cross Reef in the South China Sea, as some <a href="https://warontherocks.com/2019/05/hiding-in-plain-sight-chinese-expansion-in-southeast-asia">observers</a> have pointed out. Yet others <a href="https://www.thedrive.com/the-war-zone/32182/satellite-imagery-doesnt-support-conclusion-that-new-cambodian-airfield-is-a-chinese-base">stress</a> this length is not uncommon at airports that will be able to accommodate airliners, especially in an area of the world that experiences high temperatures year-round. There are no other indications the airport is designed for military use.</p><p>Researchers further <a href="https://www.ft.com/content/23968248-43a0-11e6-b22f-79eb4891c97d">assessed</a> in 2016 that a 10,000-ton pier (port) within the Pilot Zone would be large enough to host Chinese frigates and destroyers. At approximately 207 meters in length, the dock, which sits in 11-meter deep waters, could likely service 1 such vessel at a time based on the <a href="https://www.oni.navy.mil/Portals/12/Intel%20agencies/China_Media/2020_China_Recce_Poster_UNCLAS.jpg?ver=2020-02-19-081430-327">2019-2020 Peoples Liberation Army Navy (PLAN) Forces Recognition and Identification Guide</a> produced by the US Navys Office of Naval Intelligence. As discussed below, however, the Pilot Zone is now envisioned to include 2 additional deep-water ports. Outside of the tourist areas, most of the Pilot Zone is still at the conceptual stage and there are conflicting reports about the specifications of these other 2 ports. Some sources <a href="https://archive.ph/zZVgp">claim</a> there will be 2 additional 10,000-ton ports, others <a href="https://archive.ph/14PHH">point</a> to a 100,000-ton general port (10), and some non-company materials <a href="https://thepeoplesmap.net/project/cambodia-china-comprehensive-investment-and-development-pilot-zone-dara-sakor-seashore-resort">claim</a> (without citation) that 1 of the additional ports will be a 2,000-ton port. In any case, it is likely that at least 1 of the additional ports will increase the amount of space that could theoretically be used by PLAN ships.</p><h4 id="the-project-continues">The Project Continues</h4><p>In spite of US sanctions and speculation regarding its potential for military-use, the Pilot Zone has continued to develop since 2017. Basic infrastructure has expanded, new developments within the zone have been approved and begun construction, and the international airport inches closer to its grand opening. This work is now likely spearheaded by a new firm in the UDG family: Coastal City Development Group Co. (CCDG; ;     .). This company initially formed under a different name just after C4ADS published its report in early 2018 but adopted the CCDG name after UDG Cambodia was sanctioned.</p><p>In March 2022, the China-based Global Times tabloid <a href="https://archive.ph/JO2J3">reported</a> that CCDG is now the project developer of the Pilot Zone on behalf of Chinese developer Union Development Group. Global Times does not specify UDG Tianjin or UDG Cambodia. Cambodian corporate records show that CCDG was initially established as Union City Development Group Co. Ltd. (    .) in July 2018. Insikt Group cannot say when plans to establish this company were formed, but its creation occurred several months after C4ADS report was published, which likely stimulated <a href="https://archive.ph/ztjHP">additional</a> <a href="https://archive.ph/GLiSu">negative</a> <a href="https://www.businessinsider.com/r-in-cambodia-stalled-chinese-casino-resort-embodies-silk-road-secrecy-risks-2018-6">attention</a> directed toward the Pilot Zone amid ongoing <a href="https://archive.ph/VFh6y">coverage</a> of the longstanding land disputes.</p><p>In December 2020, just months after US sanctions were placed on UDG Cambodia, Union City Development in Cambodia changed its name to CCDG. The new identity distances this new member of the UDG family from the Union brand, though only in name. CCDG is <a href="https://archive.ph/II5g3">registered</a> as a foreign Chinese company according to the records of Cambodias Ministry of Land Management, Urban Planning and Construction. Although it is a separate commercial entity, CCDG is almost certainly closely linked to UDG Cambodia and UDG Tianjin. With CCDGs creation, the primary tourism-oriented development area within the Pilot Zone is now called Coastal City, rather than Dara Sakor. This can be seen in the logos on UDG Cambodias website (see <strong>Figure 7</strong>). This Coastal City logo also appears on CCDGs website. Highlighting the link between this CCDG and UDG Tianjin, the latter <a href="https://archive.ph/UTWeY">changed</a> its name to Tianjin Union City Development Group Co. () in February 2022 (which is highly similar to CCDGs original name).</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_6a_c73956025b.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-6a.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_6b_1af80189a4.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-6b.png"></p><p><strong>Figure 6: CCDG corporate registration record showing name change in December 2020 (Source: Cambodian Ministry of Commerce, Department of Business Registration)</strong></p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_7a_8f73749cb5.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-7a.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_7b_965d61c1a4.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-7b.png"></p><p><strong>Figure 7: The logo on UDG Cambodias website in 2018 (left) as compared to the logo in 2022 (right) (Source: <a href="https://web.archive.org/web/20181214003408/http://www.union-groupcompany.com:80/webpage/ch/cms/index/index_1.shtml">UDG Cambodia 2018</a>; <a href="https://web.archive.org/web/20181214003408/http://www.union-groupcompany.com:80/webpage/ch/cms/index/index_1.shtml">UDG Cambodia 2022</a>)</strong></p><p>The overall plan for developing the Pilot Zone is largely the same as it was several years ago, but updated marketing materials use new names for some sub-projects in the Pilot Zone and provide additional details. The overall plan for the Pilot Zone now includes 3 primary divisions as listed below and shown in <strong>Figure 8</strong>. Each of these districts will be further subdivided into specialized zones and specific projects as depicted in earlier materials. In addition to the 10,000-ton <a href="https://web.archive.org/web/20220608112332/http://www.coastalcitygroup.net/StarSea.aspx?type=53">pier</a> (port) for cruise liners and commercial goods described in C4ADSs report, current plans further include a deep-water port in both Coastal City Future New District and Coastal City World Trade New District.</p><p>Marketing materials downloaded from CCDGs website show that current plans for the Pilot Zone also <a href="https://web.archive.org/web/20220608112322/http://www.coastalcitygroup.net/business.aspx?type=20">emphasize</a> Smart City features enabled by information technology to provide security for people, property, and technology. They also show that medical and wellness facilities, including multiple hospitals (the largest having 500 to 800 <a href="https://web.archive.org/web/20220608112346/http://www.coastalcitygroup.net/business.aspx?type=22">beds</a>), spa services and yoga providers, and access to Chinese traditional medicine; and education facilities, including a vocational school and international school, remain part of the zones vision. At least 1 marketing image, <a href="https://archive.ph/KGDOQ">hosted</a> on a realty website, suggests the Coastal City World Trade New District will include a Permanent Site for [the] ASEAN Forum. It is important to note that while UDG Cambodia owns the lease and CCDG is now a major, perhaps leading, contributor in developing the Pilot Zone, many other companies are also, or will be, <a href="https://thepeoplesmap.net/project/cambodia-china-comprehensive-investment-and-development-pilot-zone-dara-sakor-seashore-resort">involved</a> as partners and investors. The future commercial ports could be operated by a company other than UDG Cambodia or CCDG.</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_8_f6697422e8.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-8.png"></p><p><strong>Figure 8: Overall plan for the Pilot Zone from a CCDG marketing booklet published in 2022. Translations by Insikt Group (Source: <a href="http://www.coastalcitygroup.net/upload/file/2022-08-03/a7a9c41a-dd35-4817-ba47-40831cbc79de.pdf">CCDG</a>).</strong></p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_9_ab69c7abb9.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-9.png"></p><p><strong>Figure 9: Undated Pilot Zone area detail from CCDG, edited to accommodate translations by Insikt Group (Source: <a href="http://www.coastalcitygroup.net/upload/file/2021-08-18/e19de9cc-f904-4dde-a06b-0adde1a5d690.pdf">CCDG</a>)</strong></p><p>Comparing the content of CCDGs <a href="https://web.archive.org/web/20220608112332/http://www.coastalcitygroup.net/StarSea.aspx?type=53">website</a>, Google Earth satellite imagery from late 2020, and mid-2022 satellite imagery acquired through SkyWatch with C4ADS April 2018 report, satellite imagery from late 2017, and other <a href="https://archive.ph/MHcBd">sources</a> indicates that construction and development of the Pilot Zone is continuing (see <strong>Figure 10</strong>). Aside from the airports construction, focus was very likely on <a href="https://web.archive.org/web/20220608112339/http://www.coastalcitygroup.net/business.aspx?type=24">establishing</a> power and telecommunications infrastructure as well as expanding the tourism projects of the Pilot Zone (see <strong>Figure 10</strong> and <strong>Figure 11</strong>).</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_10_c47434bd75.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-10.png"></p><p><strong>Figure 10: Areas of development within the the Pilot Zone in December 2017 and December 2020 (Source: Google Earth, December 2017, December 2020; Created by Insikt Group)</strong></p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_11_aad87f116a.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-11.png"></p><p><strong>Figure 11: Comparison of reported completed Pilot Zone development in 2017 and 2022 (Source: <a href="https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5ad5e20ef950b777a94b55c3/1523966489456/Harbored+Ambitions.pdf">C4ADS</a>; CCDG [<a href="https://web.archive.org/web/20220608112332/http://www.coastalcitygroup.net/StarSea.aspx?type=53">1</a>, <a href="https://web.archive.org/web/20220608112339/http://www.coastalcitygroup.net/business.aspx?type=24">2</a>]; <a href="https://archive.ph/MHcBd">UDG</a>; Google Earth)</strong></p><p>Since the September 2020 sanctions, work on the Pilot Zone has advanced in several areas. For example, the Tourism, Ecological, Marine and International (Temi) tourism city development project (also known as TEMI Mini Galaxy), which is reportedly <a href="https://archive.ph/p5H9r">valued</a> at more than $500 million USD, has seen significant new construction based on satellite imagery from December 2020 and July 2022 (see <strong>Figure 12</strong>). The land area around the Chhne Dara Chan cultural tourism hub project has also undergone significant development (see <strong>Figure 13</strong>). The airport is also now more complete than it was at the time the US imposed sanctions (see <strong>Figure 14</strong>).</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_12b_00438194ed.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-12b.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_12a_34195444a5.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-12a.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_12c_8baabb1ed3.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-12c.png"><strong>Figure 12: Artistic rendering of the future TEMI Mini Galaxy (top), development in December 2020 (left), and development in July 2022 (right) (Sources: <a href="http://www.coastalcitygroup.net/upload/file/2022-04-28/9dd48756-973f-45bd-b5f7-8f8aef6d47a8.pdf">CCDG</a>; Google Earth, December 2020; Pleiades 0.5m, courtesy of SkyWatch)</strong></p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_13a_4a9e4455a2.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-13a.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_13c_65808578da.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-13c.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_13b_d74b377353.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-13b.png"></p><p><strong>Figure 13: Artistic rendering of the future Chhne Dara Chan (top), development from December 2020 (left), and development as of February 2022 (right) (Sources: <a href="http://www.coastalcitygroup.net">CCDG</a>; Google Earth, December 2020; Pleiades 0.5m, courtesy of SkyWatch)</strong></p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_14a_f865df3fbe.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-14a.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_14b_3c77d4708a.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-14b.png"></p><p><strong>Figure 14: Dara Sakor International Airport in December 2020 (left) and May 2022 (Sources: Google Earth, December 2020; Planet SkySat 0.5m, courtesy of SkyWatch)</strong></p><p>Other aspects of development are also moving forward despite sanctions. Examples include:</p><ul><li>In late November 2020, representatives of CCDG <a href="https://archive.ph/IpaR1-">promoted</a> investment opportunities related to the Pilot Zone and Coastal City Tourist Resort () at the 17th China-ASEAN Expo under the companys original name (Union City Development Group).</li><li>In January and April 2021, CCDG <a href="https://web.archive.org/web/20220705201949/http://www.coastalcitygroup.net/business.aspx?type=21">signed</a> at least 3 cooperative agreements with universities and vocational colleges in China pursuant to education and cultural exchange projects in the zone. </li><li>In March 2021, CCDG <a href="https://archive.ph/GA9jL">met</a> with China Construction Sixth Engineering Division Corporation () and export credit insurer Sinosure (); the 3 discussed development of the Pilot Zones airport, ports, and industry parks (), as well as project financing. </li><li>In March 2021, CCDG <a href="https://archive.ph/uqLTS">signed</a> a letter of intent for strategic cooperation with China-Africa TEDA Investment Co. Ltd. () to develop industry real estate in the Pilot Zone.</li><li>In April 2022, Dara Sakor International Airport <a href="https://archive.ph/JmSli">passed</a> flight verification of its communications, navigation, and lighting equipment. Reports from November 2021 asserted the airport would open to commercial operations in mid-2022, but this schedule has been <a href="https://archive.ph/qG0CV">delayed</a>.</li><li>On June 7, 2022, CCDG began <a href="https://archive.ph/KPkYI">inviting</a> investors for an unspecified business street ().</li></ul><p>However, one aspect of the Pilot Zone does not appear to have progressed: port construction. CCDGs website <a href="https://web.archive.org/web/20220608112332/http://www.coastalcitygroup.net/StarSea.aspx?type=53">lists</a> a 10,000-ton travel-commercial goods dual-use pier [port] as completed, but the appearance of this port in satellite imagery from mid-2022 is largely the same as its appearance in late 2017 and late 2020. The pier itself looks to be in better condition than previous years, possibly more complete, but the shore area remains underdeveloped. Some parts of the website <a href="https://web.archive.org/web/20220608112339/http://www.coastalcitygroup.net/business.aspx?type=24">reference</a> a 20,000-ton cruise liner port () as also having been completed, but this is likely a misrepresentation of the aforementioned 10,000-ton pier (port). Insikt Group did not identify new construction on the 2 additional deep-water ports now planned for the zone.</p><p><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_15a_c5b2818651.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-15a.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_15b_ad8e2da270.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-15b.png"><img src="https://cms.recordedfuture.com/uploads/despite_us_sanctions_large_scale_belt_and_road_initiative_project_in_cambodia_forges_ahead_figure_15c_0eac3710fa.png" alt="despite-us-sanctions-large-scale-belt-and-road-initiative-project-in-cambodia-forges-ahead-figure-15c.png"></p><p><strong>Figure 15: The 10,000-ton pier (port) in January 2017 (top), July 2020 (left), and May 2022 (Sources: Google Earth, January 2017, July 2020; Planet SkySat 0.5m, courtesy of SkyWatch)</strong></p><h4 id="outlook">Outlook</h4><p>When discussing Chinas military power projection, many news reports and commentaries <a href="https://foreignpolicy.com/2021/07/07/china-pla-military-bases-kiribati-uae-cambodia-tanzania-djibouti-indo-pacific-ports-airfields">focus</a> on the concept of a military base. This evokes images of China building a series of permanent installations with hardened facilities similar to those of the US. Although there are differing assessments as to whether China is seeking or will, under certain conditions, seek to establish formal military bases beyond its current <a href="https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1005&context=cmsi-maritime-reports">logistics base</a> in Djibouti, China is very likely to continue <a href="https://direct.mit.edu/isec/article-abstract/46/4/9/111175/Pier-Competitor-China-s-Power-Position-in-Global?redirectedFrom=fulltext">employing</a> a <a href="https://ndupress.ndu.edu/Portals/68/Documents/stratperspective/china/ChinaPerspectives-7.pdf">pit stop</a> model that <a href="https://ndupress.ndu.edu/Portals/68/Documents/Books/beyond-borders/990-059-NDU-PLA_Beyond_Borders_sp_jm14.pdf">uses</a> commercial port facilities to support the military logistics needs of operations other than war. The US government sanctioned UDG Cambodia in 2020 in part because it was concerned the Pilot Zone could <a href="https://home.treasury.gov/news/press-releases/sm1121">host</a> Chinese military assets. However, the sanctions have failed to stop progress in the zone. While not all Chinese port and port-city projects will become strategic strongpoints or otherwise be used for military purposes, the Pilot Zones location and envisioned  or actual  features point to this possibility. As such, continued monitoring of progress and activities within the zone is warranted.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2022_1128_Blog_Intelligence_Report_Main_Feature_23915f7c4e.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Myanmar Coup and Internet Censorship Pushes Civilians to Underground Forums, Dark Web]]></title>
            <link>https://www.recordedfuture.com/myanmar-internet-censorship-dark-web</link>
            <guid>https://www.recordedfuture.com/myanmar-internet-censorship-dark-web</guid>
            <pubDate>Sun, 08 May 2022 00:00:00 GMT</pubDate>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_a86eedc2e6.png" alt="insikt-group-logo-updated-3.png"></p><p>*<strong>Editors Note</strong>: The following post is an excerpt of a full report. To read the entire analysis, <!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b" class="hs-cta-wrapper"><span id="hs-cta-b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b" class="hs-cta-node hs-cta-b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b">&lt;!-- [if lte IE 8]&gt;</p><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/252628/b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b"><img id="hs-cta-img-b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/252628/b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b.png" alt="click here" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(252628, 'b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b', {"region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --> to download the report as a PDF.*<p><em>This report introduces international readers to the current geopolitical situation in Myanmar, including but not limited to the military coup and effective takeover of the government in Myanmar, violent crackdowns on pro-democracy protesters, limitations and forced blackouts of the internet service within Myanmar, and the effects of these crackdowns. The focus of the analysis is on the change in internet use among the population of Burmese civilians, the change in the internet landscape, and the overall trends including the use of encrypted messaging applications and access of the underground web, also known as the dark web. Insikt Group used the Recorded Future Platform, proprietary tools and sourcing, as well as open sources such as international news, global non-governmental organization statements, social media accounts of the incidents occurring in Myanmar.</em> </p><p><em>To protect the people of Myanmar from further persecution and violence, this report does not reveal sensitive details and forum links where the pro-democracy groups collaborate and share information.</em></p><h3 id="executive-summary">Executive Summary</h3><p>On February 1, 2021, the Myanmar military staged a government coup, arresting the democratically elected leader, Daw Aung San Suu Kyi, as well as other members of her National League for Democracy (NLD). Min Aung Hlaing, the leader of the military junta, stated that the November 8, 2020 election was fraudulent and that Aung Sang Suu Kyi and her elected party members were not the rightful leaders of the country. Hlaing imposed a 1 year state of emergency which would be followed by another election. The detainment of Aung Sang Suu Kyi, a popular figure within Myanmar and a symbol for Myanmars democracy, has led to mass protests by her supporters, with thousands of individuals taking to the streets to protest against her arrest, and other individuals taking part in the Civil Disobedience Movement (CDM). The protesters have been in direct conflict with security forces, and there has been escalating violence and use of force by the military in recent weeks, with over 200 civilians <a href="https://www.irrawaddy.com/news/myanmars-sunday-protest-fatalities-break-record-total-death-toll-exceeds-130.html">reported</a> killed and over 2,100 detained. The military has also imposed strict rules, such as curfews and censorship laws, aimed at preventing the mass coordination of protests within the country. The initial days of the military coup saw the shutdown of Myanmars internet entirely and the ban of many popular social media applications such as Facebook. While Facebook and other social media applications have since been reinstated, there are still nightly blackouts imposed by the military when Burmese are unable to access the internet. The military censorship has not deterred Burmese from finding alternatives to amplify their pro-democracy messaging, with many turning to alternative media sources, underground networks, and downloading tools to bypass censorship restrictions to amplify their narrative.</p><div class="content-box-summary"><h3 id="key-judgements">Key Judgements</h3><ul><li>Myanmars military takeover of internet and telecommunications, and subsequent internet censorship, has led to a sharp increase in dark web use by Myanmar citizens looking to circumvent government restrictions.</li><li>Pro-democracy protesters and activists within Myanmar have migrated from social media platforms to fringe communication platforms in an effort to circumvent censorship.</li><li>Hacktivist groups are driving efforts to raise awareness of alternative technology to circumvent government controls and organize pro-democracy gatherings.</li><li>Foreign influence will play a large role in the future of the Myanmar government and its people, including that of China, the US, and the UN.</div></li></ul><p>*<strong>Editors Note</strong>: This post was an excerpt of a full report. To read the entire analysis, <!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b" class="hs-cta-wrapper"><span id="hs-cta-b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b" class="hs-cta-node hs-cta-b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b">&lt;!-- [if lte IE 8]&gt;</p><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/252628/b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b"><img id="hs-cta-img-b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/252628/b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b.png" alt="click here" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(252628, 'b3dac6ae-8ba3-470a-9e8e-58f1f2ca344b', {"region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --> to download the report as a PDF.*]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/myanmar_internet_censorship_dark_web_121a1f4572.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[A New Cyber Insurance Model: Continuous Control Validation Report]]></title>
            <link>https://www.recordedfuture.com/new-cyber-insurance-model-continuous-control-validation</link>
            <guid>https://www.recordedfuture.com/new-cyber-insurance-model-continuous-control-validation</guid>
            <pubDate>Tue, 01 Feb 2022 00:00:00 GMT</pubDate>
            <content:encoded><![CDATA[<p><em><strong>Editors Note</strong>: The following post is an excerpt of a full report. To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/new-cyber-insurance-model.pdf">click here</a> to download the report as a PDF.</em></p><p><span style="font-weight: 400;">Insurance is a historical lever for hedging risk that dates to the ancient world</span><span style="font-weight: 400;">. Few modern-day objects</span><span style="font-weight: 400;"> or events prove incapable of protecting as insurance companies devise policies for personal</span><span style="font-weight: 400;"> (home, auto, life, umbrella, etc.) and commercial</span><span style="font-weight: 400;"> (lawsuits, employee injury, unexpected events, etc.) coverage to reduce the probability of monetary loss. However, consumer choice in private insurance markets requires a profitable business model. Accordingly, insurance companies have determined profitable formulas for pricing</span><span style="font-weight: 400;"> risk which are codified in actuarial tables</span><span style="font-weight: 400;">.</span></p><p><span style="font-weight: 400;">Conversely, cyber insurance policies have proven difficult to appropriately price evidenced by mounting insurance industry losses</span><span style="font-weight: 400;">. Cyber insurance emerged at the end of the twentieth century and demand for coverage accelerated in the first two decades of the twenty first century</span><span style="font-weight: 400;"> as cyber threats matured and proliferated. Most recently, Ransomware-as-a-Service has proven to be an exceptionally successful</span><span style="font-weight: 400;"> criminal monetization model driving increased demand for risk mitigation strategies that includes cyber insurance. Thomas Johansmeyer encapsulates the current situation: So, prices are low, and the risk is high. This dynamic has negatively influenced the markets ability to continue to grow at its previous aggressive rate  and has led to a profound shortage of cyber insurance</span><span style="font-weight: 400;">. Interviews with an insurance broker, insurers, and Recorded Future</span><span style="font-weight: 400;"> clients confirm that the cyber insurance market is experiencing an aggressive contraction. Businesses are facing significantly higher premiums to obtain and renew cyber insurance policies with coverage parity. One company shared the prospect of employing ten different insurers to renew a policy with $100M of aggregate coverage. Demand is superseding available supply as insurers exit the market</span><span style="font-weight: 400;">. The U.S. General Accountability Office confirmed these trends, The extent to which cyber insurance will continue to be generally available and affordable remains uncertain. Despite the upward trend in take-up rates to date, insurer appetite and capacity for underwriting cyber risk has contracted more recently, especially in certain high-risk industry sectors such as health care and education for the public-sector entities, according to the Council of Insurance Agents and Brokers, Marsh McLennan, and A.M. Best</span><span style="font-weight: 400;">.</span></p><p><span style="font-weight: 400;">Losing access to private market cyber insurance is a threat to businesses and a disservice to the public interest, similar to personal flood</span><span style="font-weight: 400;"> or fire</span><span style="font-weight: 400;"> coverage in disaster prone areas. Even if governments must intervene with additional capital (becoming the insurers of last resort) or improved governance</span><span style="font-weight: 400;">, taxpayers deserve a better model for insuring cyber risk. Certainly, reinsurers play a significant role in market liquidity, but even they face [sic] structural challenges and systemic risks, the increase in cyber-attacks, and an accumulation of exposures. These could include the nonaffirmative exposures we refer to as Silent Cyber.</span><span style="font-weight: 400;"> The risks remain opaque for insurers and reinsurers due to the difficulty with international cyber-attack attribution</span><span style="font-weight: 400;"> and the complexity of technical business operating environments. Further, technical control efficacy frequently changes, leaving point in time assessments</span><span style="font-weight: 400;"> lacking and traditional underwriters dependent on third-party auditing services</span><span style="font-weight: 400;"> that provide only partial exposure visibility. An improved underwriting model is required to restore insurer faith in risk exposure and expand the global cyber insurance market to the benefit of the global economy.</span></p><p><em><strong>Editors Note</strong>: This post is an excerpt of a full report. To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/new-cyber-insurance-model.pdf">click here</a> to download the report as a PDF.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/new_cyber_insurance_model_continuous_control_validation_ab9986cb76.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[China Propaganda Network Targets BBC Media, UK in Influence Campaign]]></title>
            <link>https://www.recordedfuture.com/china-propaganda-targets-bbc-uk</link>
            <guid>https://www.recordedfuture.com/china-propaganda-targets-bbc-uk</guid>
            <pubDate>Wed, 18 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future’s Insikt Group has discovered a large-scale, likely state-sponsored influence operation against the British Broadcasting Company (BBC) and the United Kingdom (UK). The campaign involves hundreds of websites and social media accounts and thousands of comments across state-affiliated news sources, fake news websites, and Chinese and Western social media platforms. China’s state-affiliated media and Communist Party of China (CCP) officials have recently increased their criticism of the UK and the BBC in response to a recent BBC report revealing that Beijing’s top propaganda outlets are incentivizing foreigners, called “stringers”, to create pro-China social media influence]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_logo_blog_bc7d178f60.png" alt="insikt-logo-blog.png"></p><p>Recorded Futures Insikt Group has discovered a large-scale, likely state-sponsored influence operation against the British Broadcasting Company (BBC) and the United Kingdom (UK). The campaign involves hundreds of websites and social media accounts and thousands of comments across state-affiliated news sources, fake news websites, and Chinese and Western social media platforms. Chinas state-affiliated media and Communist Party of China (CCP) officials have recently increased their criticism of the UK and the BBC in response to a recent <a href="https://www.bbc.com/news/world-asia-china-57780023">BBC report</a> revealing that Beijings top propaganda outlets are incentivizing foreigners, called stringers, to create pro-China social media influence. To counter the BBCs allegations, these propaganda accounts have taken to social media to criticize BBCs journalistic integrity, accusing them of using an underworld filter or gloom filter () on photos and video of China to make the country look lifeless, dull, and sad to foreign audiences. The BBC adamantly <a href="https://www.bbc.com/news/world-asia-china-56030340">denies</a> these accusations.</p><p>There have been over 11,000 references of the Mandarin-language term for gloom filter across open sources in the past 6 months, with over half of them occurring in the last 30 days. English-language mentions of BBC underworld filter have also spiked over the past several weeks, totaling over 56,300 in 6 weeks. Since the stringers have started spreading Chinese propaganda, English-language references to the gloom filter have increased dramatically, as shown in Figure 1. We are confident that this uptick results from recent pro-China influencers amplifying the gloom filter theory.</p><p><img src="https://cms.recordedfuture.com/uploads/china_propaganda_targets_BBC_UK_1_1_4a3d3ba9a4.png" alt="china-propaganda-targets-BBC-UK-1-1.png"><em><strong>Figure 1:</strong> Timeline of references to gloom filter in social media, by language (Source: Recorded Future)</em></p><p>Insikt Group has observed these <a href="https://www.bbc.com/news/world-asia-china-57780023">influencers, or stringers</a>, on various English and Mandarin-language sources defending China against accusations of human rights abuses, authoritarian control, and Western reporting on China that contains negative sentiment.</p><p>On July 19, 2021, Chinas Ministry of Foreign Affairs spokesperson Zhao Lijian asserted across social media that BBC edited the color out of a photo of a popular British pro-China social media influencer named Jason Lightfoot, who also goes by the moniker Living In China. One post stated, #GloomFilter comes again! It could be accounted as one of BBC&#39;s familiar supernatural skills, to turn a green and prosperous city into a grey desolation. On his <a href="https://www.youtube.com/user/JasonLightfoot">YouTube channel</a>, which has over 157,000 followers, Lightfoot shared a before and after photo of himself from the July BBC report that he claims had a gloom filter applied to make China look dull and colorless in the background.</p><p><img src="https://cms.recordedfuture.com/uploads/china_propaganda_targets_BBC_UK_2_1_cfa3ee4cb0.png" alt="china-propaganda-targets-BBC-UK-2-1.png"><em><strong>Figure 2:</strong> Disputed photo of Jason Lightfoot, as presented by Chinese news company CGTN</em></p><p>This claim is often accompanied by other criticisms of the BBC network and its reporters, accusing them of trying to make China look bad to the rest of the world through biased reporting and photo editing. This accusation was amplified across multiple English-language and Mandarin-language social media accounts and then shared by hundreds of PRC state-affiliated media, fringe media sites, and other pro-China stringers or influencers. Additionally, the so-called BBC underworld filter has been criticized in hundreds of videos throughout 2021 on popular video sites such as bilibili[.]com, CCTV, TikTok, and YouTube, with recent notable spikes in negative sentiment throughout July 2021.</p><h4 id="china-attempts-to-discredit-the-bbc-and-the-uk">China Attempts to Discredit the BBC and the UK</h4><p>On December 10, 2020, BBC released a video titled <a href="https://www.bbc.com/news/av/world-asia-china-55253182">Covid-19: How everyday life has changed in Wuhan</a>, depicting how life for citizens of Wuhan, China, has changed since the outbreak of COVID-19 in late 2019. On January 18, 2021, the BBC also produced a documentary titled <a href="https://www.bbc.com/news/av/world-asia-55681744">COVID-19: The Road Back to Wuhan</a>, which documented how Wuhan has since recovered, socially and economically. Both of these videos were criticized by Chinas top spokespersons, state-affiliated media, and subsequently Chinas social media following, as being digitally altered as <a href="https://www.globaltimes.cn/page/202102/1215710.shtml">a deliberate attempt to misguide viewers and discredit China</a>. By February 2021, the narrative had spread throughout all aspects of Chinese media: BBC is anti-China. The accusations are sourced only to netizens of China, with no evidence of the source for before and after photos represented in the media. Reports from state-affiliated media outlets such as <a href="https://www.globaltimes.cn/page/202102/1215710.shtml">Global Times</a> state that an anonymous citizen made an observation, &quot;Is it just me or are you using some kind of filter to make the colors in this video look old and give us a sense of the city looking poor?&quot; The comment received hundreds of likes and sparked a large-scale social media campaign spreading the message of the gloom filter.</p><p>On February 10, 2021, China <a href="https://www.bbc.com/news/world-asia-china-56030340">banned</a> BBC World News from broadcasting within the country. China&#39;s National Radio and Television Administration (NRTA) based the decision on internal findings that BBC World News reports about China &quot;seriously violated&quot; broadcast guidelines, including &quot;the requirement that news should be truthful and fair&quot; and not &quot;harm China&#39;s national interests&quot;. However, BBC World News is largely unavailable to the common Chinese audience, appearing only in international hotels and some diplomatic compounds. British Foreign Secretary Dominic Raab responded publicly to the move, calling it an unacceptable curtailing of media freedom, noting that China has some of the most severe restrictions on media &amp; internet freedoms across the globe, &amp; this latest step will only damage Chinas reputation in the eyes of the world. The United States (US) State Department also commented on the situation, calling it part of a wider campaign to suppress free media in China.</p><p><img src="https://cms.recordedfuture.com/uploads/china_propaganda_targets_BBC_UK_3_1_08c6e1ead4.png" alt="china-propaganda-targets-BBC-UK-3-1.png"><em><strong>Figure 3:</strong> China state-affiliated media accusation of BBC gloom filter (Source: Global Times)</em></p><p>Throughout June and July 2021, Chinas foreign ministry spokesperson Hua Chunying shared images on social media that criticize the US, the UK, and Canada for alleged human rights abuses of the past. The image (Figure 3), created by Global Times and sourced from media reports, shows the name of the nation on the top, accompanied by the corresponding flag, and listed statistics of discrimination of ethnic groups (allegedly conducted by Clear View Research), incompetence in handling COVID-19, and violent treatment of civilians. The image was accompanied by a strong message shaming Western nations for interfering in Chinas affairs, almost certainly referring to the implementation of <a href="https://www.bbc.com/news/world-europe-56487162">sanctions</a> on China for human rights violations in Xinjiang: The #US, #Canada &amp;the #UK should feel ashamed for their blind eyes to their own shocking #humanrights records and sheer lies &amp;evil-purposed interference in China&#39;s internal affairs. Justice will prevail.</p><p><img src="https://cms.recordedfuture.com/uploads/china_propaganda_targets_BBC_UK_4_1_2f86b92625.png" alt="china-propaganda-targets-BBC-UK-4-1.png"><em><strong>Figure 4:</strong> China amplifying anti-UK message in state-affiliated social media and news</em></p><p>Hua Chunyings original social media post received nearly 1,200 likes and 350 shares. The post was also shared by the account of the Chinese embassy in the UK, which received much less traction: 6 likes, 6 comments, and only 3 shares.</p><p>During a daily press conference on June 23, 2021, Zhao Lijian addressed the UK in a statement in response to criticism of Beijings handling of Uyghur Muslims in Xinjiang. In his statement, he deflects blame back on the UK: The UK is by no means a model student &amp; has no authority to lecture others on human rights. It should earnestly reflect upon its own grave human rights violations instead of smearing China to divert attention &amp; deflect responsibility. The tweet received over 100 likes, 27 shares, and very few comments, indicating it did not get much traction in English-language social media. However, the theme is consistent with how Chinas Ministry of Foreign Affairs is handling criticism at this time: deflecting blame and revisiting the past mistakes or perceived reputational weaknesses of its accusers.</p><p>Insikt Group judges with high confidence that this activity is a CCP-sponsored influence operation targeting the BBC and the UK government. The volume of activity paired with a clearly identifiable narrative, coordination across the Chinese state-sponsored media apparatus, use of both Mandarin and foreign-language content, use of dozens of fringe media outlets, and the campaigns alignment with the CCPs objectives create a clear picture of how the CCP is conducting large-scale information operations to counter criticism and censor foreign media. Similar recent campaigns, including against <a href="https://medium.com/dfrlab/china-weaponizes-discovery-of-graves-at-canadian-residential-schools-to-avoid-xinjiang-criticism-6bf618a6e954">Canada</a> and the US, have been observed by fellow disinformation researchers and further confirm the tactics, techniques, and procedures used in this particular campaign targeting the BBC and the UK.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/china_propaganda_targets_BBC_UK_ce1921e9d4.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Protect Against BlackMatter Ransomware Before It’s Offered]]></title>
            <link>https://www.recordedfuture.com/blackmatter-ransomware-protection</link>
            <guid>https://www.recordedfuture.com/blackmatter-ransomware-protection</guid>
            <pubDate>Wed, 04 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group reverse-engineered the Linux and Windows variants of BlackMatter ransomware and provided a high-level overview of the functionality in addition to IOCs, utilities, and detections.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_300x48_b5390f4ff2.png" alt="insikt-group-logo-updated-3-300x48.png"></p><p><em><strong>Editors Note</strong>: The following post is an excerpt of a full report. To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/MTP-2021-0804.pdf" target="_blank" rel="noopener">click here</a> to download the report as a PDF.</em></p><p><em>Insikt Group reverse-engineered the Linux and Windows variants of BlackMatter ransomware and provided a high-level overview of the functionality in addition to IOCs, utilities, and detections. The intended audience of this research is threat intelligence professionals and those interested in a technical overview of the new ransomware variant.</em></p><h4 id="executive-summary">Executive Summary</h4><p>Insikt Group analyzed Windows and Linux variants of BlackMatter ransomware, a new ransomware-as-a-service (RaaS) affiliate program founded in July 2021. During our technical analysis, we found that both variants accomplish similar goals of encrypting a victims files and appear to have been developed by a relatively sophisticated group. The Windows version of the ransomware employs several obfuscation and anti-reverse engineering techniques, suggesting that it was created by an experienced ransomware developer. BlackMatters Linux variant is another example of an emerging trend of malware targeting Linux-based systems, including ESXi and network-attached storage (NAS) devices. Recorded Future has provided reverse-engineering utilities, a YARA rule, and IOCs that organizations can use to hunt or detect the ransomware.</p><p><em><strong>Editors Note:</strong> This post was an excerpt of a full report. To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/MTP-2021-0804.pdf" target="_blank" rel="noopener">click here</a> to download the report as a PDF.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/blog_08_04_21_blackmatter_ransomware_protection_63eb1a6596.jpeg" length="0" type="image/jpeg"/>
        </item>
        <item>
            <title><![CDATA[The Business of Fraud: Online Retail Fraud in the Criminal Underground]]></title>
            <link>https://www.recordedfuture.com/online-retail-fraud-criminal-underground</link>
            <guid>https://www.recordedfuture.com/online-retail-fraud-criminal-underground</guid>
            <pubDate>Mon, 26 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future analyzed current data from the Recorded Future® Platform, as well as dark web and open-source intelligence (OSINT) sources, to review the current landscape of online retail fraud scams and schemes popular with threat actors. This report will be of most interest to anti-fraud and network defenders, security researchers, and executives charged with security and fraud risk management and mitigation.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_a86eedc2e6.png" alt="insikt-group-logo-updated-3.png"></p><p><em><strong>Editors Note</strong>: The following post is an excerpt of a full report. To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2021-0726.pdf" target="_blank" rel="noopener">click here</a> to download the report as a PDF.</em></p><p>_Recorded Future analyzed current data from the Recorded Future Platform, as well as dark web and open-source intelligence (OSINT) sources, to review the current landscape of online retail fraud scams and schemes popular with threat actors. This report will be of most interest to anti-fraud and network defenders, security researchers, and executives charged with security and fraud risk management and mitigation. This report expands upon findings addressed in the first report of the Insikt Groups fraud series, <a href="https://www.recordedfuture.com/how-cybercrime-gets-monetized/"><em>The Business of Fraud: An Overview of How Cybercrime Gets Monetized</em></a>.</p><h3 id="executive-summary">Executive Summary</h3><p>Online retail fraud is a persistent, multifaceted threat to businesses of all sizes and their customers and is likely to persist for the foreseeable future as consumers engage more with online retailers and shop more online versus at traditional brick and mortar stores. Also called e-commerce fraud, online retail fraud is the act of committing some form of fraud, such as a fraudulent transaction, on a web-based retail platform. Generally, cybercriminals will use stolen payment or account information to conduct these transactions. Some elements of online retail fraud also involve social engineering schemes that look to defraud a retail platform directly, as in the case with refunding scams against ones customer service branch, or a third party, such as interception fraud or scams that target shipping companies.</p><p>Threat actors engaging in online retail fraud discuss the topic in multiple languages, primarily English, Russian, and Chinese, discussing methods, offering tutorials and guides, and selling various goods and services ranging from significantly discounted stolen gift card information to all-inclusive refunding services targeting major retailers. If major online retailers have implemented various methods of anti-fraud mitigation, threat actors often devise techniques to bypass anti-fraud measures, namely through anti-detection (anti-detect) browsers.</p><h3 id="key-judgments">Key Judgments</h3><ul><li>Online retail fraud will likely increase in the future as e-commerce platforms continue to grow in the coming years.</li><li>We believe that threat actors will continue to demonstrate flexibility, adaptability, and opportunism amid a shifting e-commerce landscape, targeting emerging retail opportunities such as curbside pickup.</li><li>Gift card fraud is its own type of service across the dark web and a way for cybercriminals to steal and launder money. Threat actors who specialize in gift card fraud operate dedicated shops due to its high demand.</li><li>Refund fraud, or refunding for short, is both an entryway for threat actors to establish credibility on criminal forums and a growing avenue for threat actors to engage in criminal services against online retailers through social engineering.</li><li>We believe that cybercriminals will continue developing and using anti-detection tools to circumvent organizations security mechanisms.</li></ul><p><em><strong>Editors Note:</strong> This post was an excerpt of a full report. To read the entire analysis, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2021-0726.pdf" target="_blank" rel="noopener">click here</a> to download the report as a PDF.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/Business_Fraud_Criminal_Underground_Main_Feature_1a2659ac30.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[The Business of Fraud: An Overview of How Cybercrime Gets Monetized]]></title>
            <link>https://www.recordedfuture.com/how-cybercrime-gets-monetized</link>
            <guid>https://www.recordedfuture.com/how-cybercrime-gets-monetized</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future analyzed current data from the Recorded Future® Platform, information security reporting, and other OSINT sources to review 11 fraud methods and services that facilitate threat actor campaigns. In subsequent months, Recorded Future will publish in-depth reports on each method or service, the threat actors offering them, technical details where applicable, and mitigation recommendations. This report will be of most interest to anti-fraud and network defenders, security researchers, and executives charged with security and fraud risk management and mitigation.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/Primary_Logo_Insikt_Digital_RGB_45f99b2dc9.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p><em><strong>Editors Note</strong>: The following post is an excerpt of a full report. To read the entire analysis, <!--HubSpot Call-to-Action Code --><span class="hs-cta-wrapper" id="hs-cta-wrapper-422f79f5-a474-4b56-9e22-1ff88997450e"><span class="hs-cta-node hs-cta-422f79f5-a474-4b56-9e22-1ff88997450e" id="hs-cta-422f79f5-a474-4b56-9e22-1ff88997450e"><!--[if lte IE 8]><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/252628/422f79f5-a474-4b56-9e22-1ff88997450e" ><img class="hs-cta-img" id="hs-cta-img-422f79f5-a474-4b56-9e22-1ff88997450e" style="border-width:0px;" src="https://no-cache.hubspot.com/cta/default/252628/422f79f5-a474-4b56-9e22-1ff88997450e.png"  alt="click here"/></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(252628, '422f79f5-a474-4b56-9e22-1ff88997450e', {}); </script></span><!-- end HubSpot Call-to-Action Code --> to download the report as a PDF.</em></p><p><em>Recorded Future analyzed current data from the Recorded Future Platform, information security reporting, and other OSINT sources to review 11 fraud methods and services that facilitate threat actor campaigns. In subsequent months, Recorded Future will publish in-depth reports on each method or service, the threat actors offering them, technical details where applicable, and mitigation recommendations. This report will be of most interest to anti-fraud and network defenders, security researchers, and executives charged with security and fraud risk management and mitigation.</em></p><h3 id="executive-summary">Executive Summary</h3><p>The cybercriminal fraud ecosystem is a whole and interconnected enterprise. In this report, the introduction to our series on cybercriminal fraud, Insikt Group will describe 11 types of fraud methods and services currently used by threat actors to facilitate their campaigns. For each, we provide a brief overview of some notable recent developments, list some of the top vendors of these services on the criminal underground, and provide suggested mitigations for defenders to implement. The Recorded Future Platform enables research and analysis of fraud methods available on the dark web and other sources to identify cybercriminal schemes, as well as threat actors and communities that advertise said methods.</p><h3 id="outline">Outline</h3><ul><li><strong>Fraud tutorials and courses</strong> provide insights into possible vulnerabilities as well as schemes and techniques used by threat actors.</li><li><strong>Drops and mule</strong> services, unlike other cybercrime services, require a physical and human presence to successfully carry out criminal operations.</li><li><strong>Dating scams</strong> involve the creation of fake profiles on dating apps or social media platforms, or direct phishing emails that target victims with the end goal of tricking the victims into sending money or facilitating fraudulent activities.</li><li><strong>Online retail fraud</strong>, including gift card fraud and refund fraud, typically entails the use of stolen information and is frequently facilitated by anti-detect and shipping services.</li><li><strong>SIM swapping</strong> is a technique used by threat actors to gain access to a victims phone number with the end goal of using two-factor authentication (2FA) to obtain access to the victims online accounts.</li><li><strong>Money laundering services</strong> within the dark web provide a combination of services through which threat actors can conceal the origins of their money, transfer cryptocurrency into virtual currency, have funds sent to a bank account or payment card, move funds across borders, or exchange for physical currency.</li><li><strong>The role of botnets in the dissemination of malware to support fraud</strong> continues to grow as threat actors propagate some of the most prevalent malware families targeting individuals and organizations. These malware strains are specifically designed to exfiltrate information appealing to financially motivated threat actors seeking to conduct fraud.</li><li><strong>Travel and loyalty (hospitality) fraud</strong> involves threat actors scamming users into providing personally identifiable information (PII) and financial information through fraudulent travel and hospitality services, including car rentals, hotel and flight bookings, excursions, and other vacation-related offers such as bonus points, miles, and other rewards.</li><li><strong>Sales of personally identifiable information (PII) and protected health information (PHI)</strong> are conducted by threat actors who gather victim PII stolen from compromised networks, individual infected computers, leaked databases, or phishing attacks, which is then used to facilitate a wide variety of fraud.</li><li><strong>Tax return fraud</strong>, also known as stolen identity refund fraud (SIRF), is a specific case of identity theft where a criminal files a tax return with victim information to the Internal Revenue Service or state tax agencies with the goal of stealing the victims tax refund.</li><li><strong>Bank fraud</strong> is constantly evolving to follow current trends in the banking industry. Credit card fraud, online banking fraud, and wire transfers fraud are the main types of bank fraud.</li></ul><p><em><strong>Editors Note</strong>: This post was an excerpt of a full report. To read the entire analysis, <!--HubSpot Call-to-Action Code --><span class="hs-cta-wrapper" id="hs-cta-wrapper-422f79f5-a474-4b56-9e22-1ff88997450e"><span class="hs-cta-node hs-cta-422f79f5-a474-4b56-9e22-1ff88997450e" id="hs-cta-422f79f5-a474-4b56-9e22-1ff88997450e"><!--[if lte IE 8]><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/252628/422f79f5-a474-4b56-9e22-1ff88997450e" ><img class="hs-cta-img" id="hs-cta-img-422f79f5-a474-4b56-9e22-1ff88997450e" style="border-width:0px;" src="https://no-cache.hubspot.com/cta/default/252628/422f79f5-a474-4b56-9e22-1ff88997450e.png"  alt="click here"/></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(252628, '422f79f5-a474-4b56-9e22-1ff88997450e', {}); </script></span><!-- end HubSpot Call-to-Action Code --> to download the report as a PDF.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/how_cybercrime_gets_monetized_2aa7fd7b1e.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Top 6 MITRE ATT&CK Techniques Identified in 2020, Defense Evasion Tactics Prevail Report]]></title>
            <link>https://www.recordedfuture.com/top-2020-mitre-techniques</link>
            <guid>https://www.recordedfuture.com/top-2020-mitre-techniques</guid>
            <pubDate>Wed, 03 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[Top 6 MITRE ATT&CK Techniques Identified in 2020, Defense Evasion Tactics Prevail]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_3_a86eedc2e6.png" alt="insikt-group-logo-updated-3.png"></p><p><em>This report outlines a high-level landscape of tactics and techniques tagged in Recorded Future Platform data sources as mapped to the MITRE ATT&amp;CK framework over 2020. The data covers January 1 to December 1, 2020. This report is intended for those familiar with the MITRE ATT&amp;CK framework, with particular relevance to security teams that rely on the framework to inform red and blue team exercises, penetration testing, threat hunting, and various security protocol prioritizations.</em></p><h3 id="executive-summary">Executive Summary</h3><p>In 2020, the six most widely used techniques according to the Recorded Future Platform were <em>T1027  Obfuscated Files and Information, T1055  Process Injection, T1098  Account Manipulation, T1219  Remote Access Tools, T1082  System Information Discovery</em>, and <em>T1018  Remote System Discovery</em>. Additional Associated Techniques, or MITRE ATT&amp;CK techniques that were related to the top six, included the following three: <em>T1497  Virtualization/Sandbox Evasion, T1083  File and Directory Discovery</em>, and <em>T1036  Masquerading</em>.</p><p>Four of these techniques are categorized under the <em>Defense Evasion</em> tactic, followed by <em>Persistence</em> and <em>Discovery</em>. Seeing Defense Evasion tactics prevail in the data is in line with Insikt Groups observations that these tactics are becoming more commonplace in malware. Identifying these techniques helps to identify what the cyber threat landscape looked like in the last year: from opportunistic threat actors taking advantage of a remote workforce due to COVID-19 to major expansions of prominent ransomware operators to include exfiltration and extortion. All of the techniques identified were critical to the success of cyberattacks in 2020. </p><p>The challenge for defenders is making this information actionable. Detection of some of these techniques can be difficult as more advanced threat actors attempt to hide their true intentions or blend in with normal activities. As <a href="https://attack.mitre.org/techniques/T1497/001/" rel="noopener noreferrer" target="_blank">mentioned</a> in the MITRE ATT&amp;CK glossary, data should not be viewed in isolation, but rather as a pattern of activity that highlights tactics like <em>Defense Evasion</em> or <em>Persistence</em>. By correlating these techniques with additional high-fidelity events, defenders can find better indications of suspicious activity. We have included detections for both individual malware observed using the highlighted techniques and more high-level detection strategies in this report. </p><h3 id="background">Background</h3><p><a href="https://attack.mitre.org/resources/" rel="noopener noreferrer" target="_blank">MITRE ATT&amp;CK</a> is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&amp;CK framework is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the help of the ATT&amp;CK framework, security teams have a wider picture of adversary behavior, allowing mitigation and detection methods to be tested against the techniques. It has become a useful tool across many cybersecurity disciplines to provide intelligence, track trends in tactics and techniques, perform testing through red teaming or adversary emulation, and improve network and system defenses against intrusions.</p><p>The ATT&amp;CK framework has evolved since its publication in 2018, containing almost 200 unique tactics, techniques, and procedures (TTPs). The recent consolidation of the Pre-ATT&amp;CK framework with the main Enterprise ATT&amp;CK framework, as well as the introduction of subtechniques, have only furthered the usability of the framework.</p><h3 id="methodology">Methodology</h3><p>In our <a href="https://www.recordedfuture.com/mitre-attack-tactics/?__hstc=46213176.240047a9d5425b97fab081d1183fe83d.1661318863212.1664940891391.1665109684646.52&amp;__hssc=46213176.2.1665109684646&amp;__hsfp=2776202185">2019 report</a>, Insikt Group relied on the Recorded Future Malware Detonation Sandbox as a source for finding top ATT&amp;CK techniques. Based on the changes to the ATT&amp;CK framework and the continued improvement of Recorded Future data, we used three queries in the Recorded Future Platform to aid in identifying the top MITRE ATT&amp;CK techniques used in 2020. Data from each query is taken from Insikt Notes, Recorded Future Malware Detonation Sandbox samples, and Attack Vectors as automatically categorized by Recorded Future. </p><p>Insikt Group notes cover a wide range of threat intelligence and cyberattacks, which is represented in the first query. The second query, using the Malware Detonation Sandbox sample analysis as a source, provides a technical perspective focused on execution of malware. The third query looks for Cyber Attack events where a MITRE ATT&amp;CK technique was specified as an attack vector to try and capture any additional information. The queries were separated to tune out false positives and to provide a more holistic picture of techniques used. </p><p>The <a href="https://attack.mitre.org/resources/updates/updates-october-2020/index.html" rel="noopener noreferrer" target="_blank">mid-year revision</a> of the ATT&amp;CK framework, which included Pre-ATT&amp;CK and subtechniques, created what we believe to be a more accurate and detailed representation of the Cyber Kill Chain from Reconnaissance to Exfiltration and beyond. Insikt Group notes cover pre- and post- exploitation tactics (<em>Reconnaissance</em>, <em>Initial Access</em>, <em>Impact</em>, and so on) by nature of the fact that they cover finished intelligence or hearsay (for example, a threat actor claiming to have access to credentials). Malware Detonation Sandbox results, however, are focused on exploitation tactics (such as <em>Execution</em>, <em>Persistence</em>, or <em>Privilege Escalation</em>) based on dynamic analysis of the malicious samples submitted. Attack Vector results are based on Recorded Futures processing and classification of tactics used in cyberattacks globally, which varied substantially.</p><p>Because Insikt Notes, Malware Detonation Sandbox results, and references to Attack Vectors cover different ranges of tactics, the three queries together better capture the full lifecycle of what core techniques were used in cyberattacks in 2020. </p><p>Each column below is populated with the top-referenced MITRE ATT&amp;CK techniques per appearance in Insikt Notes, appearance in our Malware Detonation Sandbox source, or association with Attack Vector entities in the Recorded Future Platform. The lists in this table are ordered in descending order of reference count.</p><p><img src="https://cms.recordedfuture.com/uploads/top_2020_mitre_techniques_1_1_scaled_73ea891e36.jpg" alt="top-2020-mitre-techniques-1-1-scaled.jpg"></p><p><img src="https://cms.recordedfuture.com/uploads/top_2020_mitre_techniques_2_1_e2bcbf046f.png" alt="top-2020-mitre-techniques-2-1.png"></p><p><em><strong>Table 1</strong>: Top 10 MITRE ATT&amp;CK Techniques categorized by query (Source: Recorded Future)</em></p><h3 id="top-six-attck-technique-analysis">Top Six ATT&amp;CK Technique Analysis</h3><p><img src="https://cms.recordedfuture.com/uploads/top_2020_mitre_techniques_3_1_aeb649607b.png" alt="top-2020-mitre-techniques-3-1.png"></p><p><em><strong>Table 2</strong>: Overall Top Six ATT&amp;CK Techniques in 2020 (Source: Recorded Future)</em></p><p>We identified six techniques that were observed in two or more sources, and of those, only two techniques were present in all three source groups: _T1027  Obfuscated Files and Information_and <em>T1055  Process Injection</em>. These two techniques, which fall under the <em>Defense Evasion</em> (TA0005) and <em>Privilege Escalation</em> (TA0004) tactics, respectively, have such prolific use among threat actors because they are essential to most successful cyber threat operations, unlike specific techniques such as <em>T1486  Data Encrypted for Impact</em>, which is only useful to ransomware operators. </p><p>The additional techniques, <em>T1098  Account Manipulation</em>, <em>T1219  Remote Access Tools</em>, <em>T1082  System Information Discovery</em>, and <em>T1018  Remote System Discovery</em>, were present in only two of the three source types. These techniques represent a small fraction of the cyber landscape of 2020, including opportunistic threat actors taking advantage of a remote workforce due to COVID-19 and major expansions of prominent ransomware operators to include exfiltration and extortion. </p><p>In line with 2019s results, the top tactic these techniques share is <em>Defense Evasion</em>. Threat actors deploying ransomware, remote access tools (RATs), or infostealers, will all look to evade detection whether that is through obfuscated files that remain undetected by static file detections, or masquerade as legitimate services through process injection techniques.</p><p>Insikt Group has compiled relevant examples of each of the six techniques from the past year, including associated malware, threat actors, and associated techniques. Suggestions for mitigations and detections for each malware mentioned are linked in line. </p><h3 id="additional-attck-technique-analysis-and-detections">Additional ATT&amp;CK Technique Analysis and Detections</h3><p><img src="https://cms.recordedfuture.com/uploads/top_2020_mitre_techniques_4_1_927f879086.png" alt="top-2020-mitre-techniques-4-1.png"></p><p><em><strong>Table 3</strong>: Remaining MITRE ATT&amp;CK Techniques as displayed in Methodology  (Source: Recorded Future)</em></p><p>Insikt Group identified 16 additional MITRE ATT&amp;CK techniques (Table 3) that were widely used by threat actors in 2020. While they were identified within one of the three queries Top 10 list, they were not present in more than one of the queries and therefore not detailed in the Top Techniques Analysis section above. </p><p>Some of these are referenced in the Associated Techniques subsections, including three techniques mentioned more than once: <em>T1497  Virtualization /Sandbox Evasion, T1083  File and Directory Discovery</em>, and <em>T1036  Masquerading</em>. These techniques, categorized under Defense Evasion and Discovery tactics, derive their references from the Malware Sandbox query. </p><p>Detection of these techniques can be difficult as all three incorporate some attempt to hide their true intentions or blend in with normal activities. As mentioned in the MITRE ATT&amp;CK glossary, data should not be viewed in isolation, but rather has a pattern of activity that highlights tactics like Defense Evasion or Persistence. By correlating these techniques with additional high-fidelity events, defenders can find better indications of suspicious activity.  </p><p><em>T1497  Virtualization/Sandbox Evasion</em> is not a new technique, but its use grew last year, manifesting in malware variants like Pysa Ransomware or BABAX Stealer. Detection of <em>T1497  Virtualization /Sandbox Evasion</em> techniques can be performed with the YARA rule <a href="https://github.com/Yara-Rules/rules/tree/master/antidebug_antivm" rel="noopener noreferrer" target="_blank">Antidebug_antivm</a> from <a href="https://github.com/Yara-Rules" rel="noopener noreferrer" target="_blank">The Yara Rules Project</a>. This Yara rule detects only a subset of <em>Virtualization/Sandbox Evasion</em> tactic and should be considered a starting point or used in conjunction with other detection techniques or tools.</p><p>Detection of both techniques <em>T1083  File and Directory Discovery</em> and <em>T1036  Masquerading</em> can be done by monitoring for suspicious activity in your monitoring tools. For <em>T1083  File and Directory Discovery</em>, there are certain commands typically executed when a threat actor is actively enumerating a network. JPCERT has <a href="https://blogs.jpcert.or.jp/en/2016/01/windows-commands-abused-by-attackers.html" rel="noopener noreferrer" target="_blank">outlined</a> some of the more common commands abused by adversaries. The commands most relevant to file discovery and enumeration are dir, type, net view and net use. </p><p>Detections of the commands such as dir, type, net view, and net use alone are not enough to alert you of malicious activity, as they are also used by system administrators. However, the execution of those commands combined with the activity of downloading a file from a remote drive within 30 minutes of each other, for example, would be better indicative of malicious activity. In addition to this, a threat actor will likely use multiple Discovery tactics including <em>T1082  System Information Discovery</em> and <em>T1018  Remote System Discovery</em>, as we observed in the Associated Techniques category. </p><p>Similar to <em>T1083  File and Directory Discovery</em>, detection for <em>T1036  Masquerading</em> relies on identifying improper use of legitimate applications and tools. The Sunburst malware is a good example of masquerading malware as the code is executed under SolarWinds processes and the code also uses the SolarWinds Orion Improvement Program (OIP) for its C2 communication. Detection of this activity requires understanding the normal behavior of such tools and then identifying anomalies. While the Sunburst malware uses sophisticated techniques for masquerading, detection could still be possible by monitoring outbound connections, or monitoring for activity from SolarWinds processes, users, or hosts indicative of credential harvesting or privilege escalation.</p><h3 id="outlook">Outlook</h3><p>The ATT&amp;CK framework is designed to map the lifecycle of a cyberattack to a set of TTPs acknowledged by the cybersecurity community. Defenders can map cyberattacks to this framework to prioritize which techniques to defend against. As network and endpoint defense technologies adapt to the most novel threats, attackers will continue focusing on creating innovative ways to evade detections put in place by defenders. The constant struggle between attackers and defenders is why <em>Defense Evasion</em> remains the most prevalent tactic each year. </p><p>While defenders should prioritize tooling and detections to identify attackers during the Initial Access phase to stop the attack before it infects the victim, that is not always possible or easy to do. Defenders should also prioritize the 37 techniques encapsulated by the <em>Defense Evasion</em> tactic, specifically the ones outlined in this report that were most common in 2020. One challenge defenders face when building detections for a particular <em>Defense Evasion</em> technique such as <em>T1140  Deobfuscate/Decode Files or Information</em> is the wide variety of implementations attackers use. In these cases, it is more important to focus on the underlying detectable artifacts and behavior hidden underneath the specific technique than the technique itself.</p><p>In line with last years findings, the second most common tactic after <em>Defense Evasion</em> was <em>Discovery</em> in 2020. The extensive use of the <em>Discovery</em> tactic highlights the common goal among almost all attackers to discover and steal sensitive information. This includes ransomware operators such as those behind Netwalker discovering and exfiltrating data for extortion purposes, info stealers such as FickerStealer looking for Bitcoin wallets, and RATs such as SDBbot running network scans for future lateral movement. Many of the techniques used by threat actors to perform <em>Discovery</em> have legitimate uses, as described above, so defenders should focus on building detections to identify improper use of these legitimate applications and tools.</p><p>Identifying techniques encapsulated by the <em>Defense Evasion</em> and <em>Discovery</em> tactics often gives the defender the opportunity to detect an attack during an active operation, which is crucial to mitigating damages. Although these two tactics should be prioritized by defenders, it is still important to build detections for the other 12 tactics. Every time an attacker uses another technique in the ATT&amp;CK matrix, a new opportunity is presented to the defender to detect the malicious activity. Using the mitigations, as prescribed in each section, publicly available ATT&amp;CK-mapped <a href="https://car.mitre.org/analytics/" rel="noopener noreferrer" target="_blank">detection</a> <a href="https://github.com/Neo23x0/sigma/tree/master/rules" rel="noopener noreferrer" target="_blank">mechanisms</a>, and Insikt Group Hunting Packages, defenders can stay up to date with defenses against the latest TTPs. </p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/cta_2021_0203_1_f27884ad56.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Unemployment Fraud in the Criminal Underground Report]]></title>
            <link>https://www.recordedfuture.com/unemployment-fraud-in-criminal-underground</link>
            <guid>https://www.recordedfuture.com/unemployment-fraud-in-criminal-underground</guid>
            <pubDate>Thu, 14 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[This report reviews the current threat landscape of unemployment
fraud in the United States within closed sources and underground
reporting. It contains information gathered using the Recorded Future®
Platform, as well as additional open source intelligence (OSINT), dark
web sources, and underground forum research.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/Primary_Logo_Insikt_Digital_RGB_45f99b2dc9.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p><em><!--HubSpot Call-to-Action Code --><span class="hs-cta-wrapper" id="hs-cta-wrapper-9b462390-28a9-431a-bc18-5130d670f5ef"><span class="hs-cta-node hs-cta-9b462390-28a9-431a-bc18-5130d670f5ef" id="hs-cta-9b462390-28a9-431a-bc18-5130d670f5ef"><!--[if lte IE 8]><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/252628/9b462390-28a9-431a-bc18-5130d670f5ef" ><img class="hs-cta-img" id="hs-cta-img-9b462390-28a9-431a-bc18-5130d670f5ef" style="border-width:0px;" src="https://no-cache.hubspot.com/cta/default/252628/9b462390-28a9-431a-bc18-5130d670f5ef.png"  alt="Click Here"/></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(252628, '9b462390-28a9-431a-bc18-5130d670f5ef', {}); </script></span><!-- end HubSpot Call-to-Action Code --> to download the complete analysis as a PDF.</em></p><p><em>This report reviews the current threat landscape of unemployment fraud in the United States within closed sources and underground reporting. It contains information gathered using the Recorded Future Platform, as well as additional open source intelligence (OSINT), dark web sources, and underground forum research. It will be of interest to organizations seeking to better understand unemployment fraud within the criminal underground, as well as investigators of threat actors performing such attacks.</em></p><h3 id="executive-summary">Executive Summary</h3><p>The COVID-19 pandemic has led to the commoditization of a variety of criminal services themed around unemployment relief originally meant to be distributed to those whose lives have been disrupted by the virus. Unemployment fraud has become increasingly accessible to threat actors lately and presents a low barrier of entry for fledgling cybercriminals. The success of fraud campaigns this year themed around relief efforts to combat the COVID-19 pandemic is likely the result of a combination of factors, including successful social engineering campaigns, the use of money mules operating throughout the U.S., and threat actors use of login information or personally identifiable information (PII) exposed during data breaches, dumps, or leaks. Some fraudsters targeting unemployment benefit systems are more likely to rely on traditional forms of social engineering such as targeted phishing emails directed at a companys executive leadership. Other tactics, such as the suspected use of money mules in connection with this fraudulent activity, overlap with the tactics of other cybercriminal groups that specialize in various types of fraud, particularly crews that specialize in business email compromise (BEC) schemes. </p><p>Given the volume of underground references to the sale of unemployment fraud tutorials and the number of views these methods generate, many fraudsters are likely still new at conducting this form of fraud. Recorded Future has seen no evidence to suspect that actors are exploiting vulnerabilities within government systems, relying instead on their ability to opportunistically target as many victims around the country as possible by harvesting previously exposed information. The general increase in unemployment fraud throughout 2020 was also likely compounded by gaps in the security hygiene of multiple government organizations responsible for safeguarding unemployment applicant data both virtually and physically. This is evidenced by actors in some states believed to be attempting to intercept physical mail that contained personal information tied to unemployment claims. The general flood of fraudulent unemployment requests that has overwhelmed government workers in many states is also enabled by the low barrier to entry for cybercriminals who can purchase stolen accounts or cheap tutorials and methods on how they can conduct similar fraud.</p><h3 id="key-judgements-and-findings">Key Judgements and Findings</h3><ul><li><p>The promotion of fraudulent unemployment services within closed-source reporting over the past six months can be divided into two broad categories: </p></li><li><p>The sale of tutorials or methods to file fraudulent claims </p></li><li><p>The sale of direct access to unemployment relief accounts that often contain a pre-existing balance of funds</p></li><li><p>Over the past six months, cybercriminals have demonstrated a preference to advertise unemployment fraud tutorials or services via messaging platforms over criminal forums, shops, or marketplaces, specifically Telegram.  </p></li><li><p>Underground sources promoting unemployment fraud services typically specialize in a variety of other forms of fraud simultaneously, including credit card fraud and tax fraud.   </p></li><li><p>The scale of fraudulent unemployment claims within the U.S. has become widespread enough in recent months to unlikely be attributed to a single threat entity.</p></li><li><p>Open source reporting on the reported losses stemming from unemployment fraud activity assessed to be in the millions of dollars has very likely contributed to the growing level of interest among underground threat actors.  </p></li><li><p>Money mules likely remain a critical component of the unemployment fraud supply chain as evidenced by images uploaded by underground sellers of fraudulent unemployment methods and open source reports surrounding the arrests of suspected mules throughout 2020.</p></li></ul><h3 id="background">Background</h3><p>Since the onset of the COVID-19 pandemic, rampant unemployment fraud has been reported throughout the U.S., with every state being impacted to varying degrees. This has manifested in various forms, from threat actors filing unemployment claims using stolen PII to state officials contending with reports of money mules funneling stolen funds to fraudulent threat actors operating overseas.</p><ul><li>In January 2020, the Federal Bureau of Investigation (FBI) <a href="https://www.ic3.gov/Media/Y2020/PSA200121" rel="noopener noreferrer" target="_blank">detailed</a> how cybercriminals use spoofed websites to harvest PII and steal money to conduct fake hiring scams with increasing complexity, advertising alongside legitimate employers and job placement firms to target victims of all skill and income levels. Criminals seeking PII to conduct unemployment fraud are likely to continue to harvest information from previously reported data dumps or breaches or within other criminal marketplaces, <a href="https://www.recordedfuture.com/underground-economy-automation/">often automated</a>, that sell the information at low costs.</li><li>Four months later, the U.S. Secret Service (USSS) <a href="https://krebsonsecurity.com/2020/05/u-s-secret-service-massive-fraud-against-state-unemployment-insurance-programs/" rel="noopener noreferrer" target="_blank">linked</a> increasing reports of fraud targeting state unemployment insurance programs to a well-organized Nigerian fraud ring. Researchers with Agari <a href="https://www.agari.com/email-security-blog/covid-19-unemployment-fraud-cares-act/" rel="noopener noreferrer" target="_blank">published</a> information that attributed a portion of this Nigerian fraud occurring at the time to a group of cybercriminals dubbed Scattered Canary. Potential losses as a result of the groups activities over the past several years are <a href="https://krebsonsecurity.com/2020/05/u-s-secret-service-massive-fraud-against-state-unemployment-insurance-programs/" rel="noopener noreferrer" target="_blank">assessed</a> to be in the hundreds of millions of dollars. The USSS <a href="https://krebsonsecurity.com/2020/05/u-s-secret-service-massive-fraud-against-state-unemployment-insurance-programs/" rel="noopener noreferrer" target="_blank">said</a> the fraud network is believed to include hundreds of money mules, a term used to describe willing or unwitting individuals who are recruited to help launder the proceeds of fraudulent financial transactions.</li></ul><p>Reports of rampant unemployment fraud continue to persist across <a href="https://www.wbrc.com/2020/12/14/adol-seeing-increase-fraudulent-unemployment-claims-how-find-out-if-someone-has-filed-with-your-identity/" rel="noopener noreferrer" target="_blank">multiple</a> <a href="https://www.radio.com/971talk/news/unemployment-fraud-cases-ramp-up-in-illinois" rel="noopener noreferrer" target="_blank">states</a>. Recorded Future has seen no instances of unemployment fraud that have resulted from an inherent vulnerability within any government systems; rather, reports have detailed various techniques used by individual fraudsters from state to state, making it unlikely that all reports of unemployment fraud that have emerged this year are due to one overarching threat entity. The general increase in unemployment fraud throughout 2020 was likely compounded by failures in the security hygiene of multiple government organizations responsible for safeguarding unemployment applicant data. Security experts believe <a href="https://www.latimes.com/california/story/2020-12-21/california-precautions-ignored-employment-development-department" rel="noopener noreferrer" target="_blank">multiple</a> <a href="https://www.nytimes.com/2020/09/11/business/economy/pandemic-unemployment-assistance-fraud.html" rel="noopener noreferrer" target="_blank">states</a> likely had pre-existing issues related to their ability to combat this specific form of fraud even prior to the COVID-19 pandemic, including failures to:</p><ul><li>Implement or renew identity verification software to review claims before they are disseminated </li><li>Cross-check benefit claims against personal data on other individuals such as prison <a href="https://www.latimes.com/california/story/2020-12-21/california-precautions-ignored-employment-development-department" rel="noopener noreferrer" target="_blank">inmates</a>, individuals listed as <a href="https://www.azfamily.com/news/investigations/3_on_your_side/originals/criminals-using-dead-arizonans-information-to-file-fraudulent-unemployment-claims/article_524475e2-1ab9-11eb-a483-1f71e2a6deda.html" rel="noopener noreferrer" target="_blank">deceased</a>, or out-of-state <a href="https://www.washingtonpost.com/business/2020/06/08/unemployment-fraud-congress/" rel="noopener noreferrer" target="_blank">residents</a> </li><li>Ensure that applicant PII such as Social Security numbers (SSN) are not included in mail correspondence susceptible to physical theft</li></ul><p>It is very likely that emerging cybercriminals have become emboldened by open source reports detailing how easy it is to conduct this form of fraudulent activity with no prior knowledge of unemployment systems, combined with the relatively low price of purchasing a tutorial or method to facilitate their activities. </p><h3 id="threat-analysis">Threat Analysis</h3><p>The promotion of fraudulent unemployment services within closed source reporting over the past six months can be divided into two broad categories: </p><ul><li>The sale of tutorials or methods to file fraudulent claims with government systems or platforms that assist with unemployment relief</li><li>The sale of direct access to unemployment relief accounts that often contain a pre-existing balance of funds</li></ul><p>In March 2020, U.S. lawmakers <a href="https://www.investopedia.com/how-the-coronavirus-stimulus-bills-affect-you-4800404" rel="noopener noreferrer" target="_blank">passed</a> the Coronavirus Aid, Relief, and Economic Security (CARES) Act, which established the Pandemic Unemployment Assistance (PUA) program. This program expands unemployment insurance eligibility to self-employed workers, freelancers, independent contractors, and part-time workers impacted by the coronavirus. Though the PUA program is only one component of unemployment relief offered by government entities within the U.S. in response to the pandemic, it has continued to be an integral component of the growing volume of underground advertisements linked to unemployment fraud. </p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_1_2_242c2083b6.png" alt="unemployment-fraud-in-criminal-underground-1-2.png"></p><p><em><strong>Figure 1</strong>: PUA program mentions within dark web sources (Source: Recorded Future)</em></p><p>The visual below shows the results of a survey provided to members of one Telegram channel devoted to multiple forms of fraudulent activity. Though the sale of PUA information came in last place in the survey, its very inclusion on the survey demonstrates that this element of fraudulent activity has generated enough demand among cybercriminals to warrant its own sales category within closed sources. Recorded Future has knowledge of at least one Telegram channel implementing an operation as a result of expectations that provisions surrounding unemployment relief were set to expire at the end of 2020, making fraudulent PUA claims a priority for admins of the channel attempting to generate as much revenue as possible in the event that the PUA program or other unemployment relief offerings were suddenly to cease.</p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_2_1_c1c36456fa.png" alt="unemployment-fraud-in-criminal-underground-2-1.png"></p><p><em><strong>Figure 2</strong>: November 2020 survey in Telegram channel dedicated to fraud activities (Source: Telegram)</em></p><p>Over the past six months, cybercriminals have demonstrated a preference for advertising unemployment fraud tutorials or account information via messaging platforms over criminal forums, shops, or marketplaces. However, the demand within traditional marketplaces remains high enough for administrators to continue to support various offerings related to unemployment fraud. </p><p>Another appealing aspect of this form of fraud is the relatively low price of tutorials or account information. Recorded Future observed tutorials and methods related to conducting unemployment fraud selling for anywhere between $5 to $100, depending on the state being targeted. The price of PUA information or access to a state government platform containing a pre-existing balance of relief funds was typically higher (as denoted in Figure 3 below, where some threat actors were asking for between $80 to $100 for PUA information associated with New York and Wisconsin unemployment claims). </p><p>Threat actors selling this information demonstrated a willingness to forgo accounts with relief balances valued in the thousands of dollars to ensure the long-term success of their underground business model. Additionally, the higher price for direct access to accounts with pre-existing balances as opposed to the tutorials is likely a result of buyers being in the position to more easily access the funds that another veteran actor likely already procured. This is in contrast with tutorials where the buyer is still ultimately responsible for obtaining victim accounts to achieve profit while avoiding attention from law enforcement.</p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_3_2_1048a7e404.png" alt="unemployment-fraud-in-criminal-underground-3-2.png"></p><p><em><strong>Figure 3</strong>: Sale of access to random PUA account information</em></p><p>Other fraud methods related to unemployment scams contained what cybercriminals considered to be useful tips to increase the likelihood of achieving success when submitting a fraudulent claim. Tips recommended by fraudsters across multiple tutorials included the following:</p><ul><li><p>If asked on an application as to when the COVID-19 pandemic affected your employment activities, put March 25, 2020, just two days prior to when the CARES Act was implemented by Congress. </p></li><li><p>Filing a claim as Self-Employed when possible will net applicants more money than those who filed that they work for another company.</p></li><li><p>This same guide later advised other fraudsters which job they had success with when filing claims. In this tutorials case, the author recommended pretending to be a professional photographer or another job that would be more difficult to fulfill within a remote environment.</p></li><li><p>If asked about how much you earned annually in 2019, when filing a fraudulent claim, list an amount between $16,850 and $42,100. The author in this case likely believed that providing a salary above a particular threshold would increase the likelihood of it being flagged by law enforcement investigators or state officials reviewing individual claims. </p></li><li><p>Social engineering techniques were also encouraged within multiple tutorials. In one guide, the authors reported that calling a PUA claim line and entering a Social Security number (SSN) obtained from another source would verify whether that individual already had an open unemployment relief claim. If no claim had been filed yet, public record aggregation websites such as Verified and Truthfinder were recommended as sources of additional PII on a target. The actors specifically advised using good SSN and date of birth (DOB) information on a target to conduct further research on these public record aggregation sites, likely in an attempt to harvest additional PII. However, the actors also showed a level of bias within this guide, with their final recommendation being to visit a specific underground marketplace they are affiliated with to purchase additional information.</p></li></ul><p>Underground sources selling fraudulent unemployment relief tutorials or account information typically specialize in other forms of fraud, including credit card and tax fraud. Additionally, sellers of these types of fraud do not appear to devote all resources to targeting unemployment systems in one state at a time. Instead, they offer services to access information from a variety of states simultaneously, based on client demand and the level of difficulty in obtaining access to unemployment relief accounts within a particular state.</p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_4_1_f85e665fbd.png" alt="unemployment-fraud-in-criminal-underground-4-1.png"></p><p><em><strong>Figure 4</strong>: Screenshot of state PUA offerings from a single underground actor (Source: Telegram)</em></p><p>Criminal shops such as Genesis Store and Russian Market that specialize in the sale of an end users browsing history or digital footprint have also regularly contained login information for state government domains associated with unemployment relief throughout 2020. Recorded Future saw no indication or comments among cybercriminals that these bots containing state government login information were being specifically purchased to commit acts of unemployment fraud, though the lack of a discussion functionality within these shops make it difficult to determine the specific motivation behind purchases from these sources.</p><h4 id="alert-to-changes-in-government-monitoring">Alert to Changes in Government Monitoring</h4><p>As a result of the steady uptick in reports of unemployment fraud across the U.S., states have attempted to mitigate the threat posed by this form of fraudulent activity to varying degrees. As of November 2020, the USSS <a href="https://www.nbcnews.com/tech/security/criminals-launder-coronavirus-relief-money-venmo-cash-app-paypal-apps-rcna180" rel="noopener noreferrer" target="_blank">reported</a> 700 open investigations related to fraud targeting the Paycheck Protection Program and the Unemployment Relief Insurance program. As individual states continue to develop stronger security postures to combat this rampant fraud, cybercriminals advertising unemployment fraud methods or account information are continuing to monitor these changes as well and adjusting accordingly. </p><ul><li>Figure 5 below shows an administrator of a Telegram channel devoted to fraud activity advising members to avoid purchasing or attempting to access unemployment platforms linked to seven specific U.S. states they no longer believed to be distributing financial relief. </li><li>Individual Telegram channels appear to have varying recommendations as to which state is or is not an ideal target at any given time. For example, within two weeks of the Telegram post in Figure 5, originally uploaded in November 2020, threat actors resumed selling methods or account information associated with state systems in Ohio within the same channel, despite these prior warnings by channel administrators.  </li><li>Threat actors within these messaging platform channels have also expressed concern that some states are more capable of identifying their location than others. In one scenario, Recorded Future observed a comment from a user advising users to stay away from four specific U.S. states they believed to be likely using tracking applications to monitor for fraudulent claims. The use of proxy IP addresses were highly encouraged within closed sources to prevent this form of tracking and ensuring that a user is not locked out of any unemployment platforms, were government entities to flag their originating IP address as suspicious.</li></ul><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_5_1_0af6fcff07.png" alt="unemployment-fraud-in-criminal-underground-5-1.png"></p><p><em><strong>Figure 5</strong>: Threat actor advising channel members to avoid targeting certain states (Source: Telegram)</em></p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_6_1_84b69a1ecd.png" alt="unemployment-fraud-in-criminal-underground-6-1.png"></p><p><em><strong>Figure 6</strong>: Warning from admin about government efforts to spy on Telegram channels (Source: Telegram)</em></p><p>We are not aware of any security vulnerabilities within government or corporate systems that have assisted in the spread of this fraudulent activity. It is more likely that threat actors will continue to opportunistically target unemployment relief platforms by harvesting exposed login information or purchasing bundles of PII for sale within underground sources. </p><h4 id="assisting-other-fraudsters">Assisting Other Fraudsters</h4><p>Generally, administrators maintaining channels within messaging platforms devoted to unemployment fraud were receptive to the idea of mentoring newer users, likely in an attempt to develop a long-term relationship with partners capable of generating demand for their channels and increasing revenue. This willingness among cybercriminals to partner with one another on unemployment fraud carried over to cybercriminal forums as well, where we observed recurring requests from users seeking serious partners for long term-fraud activity. Given that these threads encouraged interested parties to contact the vendor via private channels, the visibility Recorded Future has had into the potential success of these partnerships has been limited.</p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_7_1_6dc6b762be.png" alt="unemployment-fraud-in-criminal-underground-7-1.png"></p><p>_<strong>Figure 7</strong>: Request for unemployment benefit partner _</p><p>Vendors of employment scams or PUA fraud methods are often involved in several different scams simultaneously, including disaster relief fraud, Social Security fraud, tax fraud, and credit card fraud. This is the norm for cybercriminal organizations able to operate multiple services capable of providing different streams of revenue. </p><p>Recorded Future reviewed several tutorials and methods circulating within the criminal underground regarding a combination of PUA or general unemployment fraud techniques. For the majority of the methods advertised, cybercriminals were expected to already be in possession of stolen PII or fullz to take advantage of the guides and be in a position to turn a profit. Fullz is a slang term for &quot;full information&quot; that criminals who steal PII use to refer to a set of information on a prospective fraud victim, generally including an individuals name, address, date of birth, Social Security and drivers license numbers, as well as the PII of family members and any other miscellaneous information available (such as criminal or employment records).</p><p>The same sellers of PUA fraud methods were very often willing to sell this information separately at additional cost. This demonstrates that financial success remains the underlying motivation, despite any attempts by the vendors to portray themselves as good Samaritans willing to assist fledgling criminals who may be new to this type of fraudulent activity.</p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_8_1_84a393a3b1.png" alt="unemployment-fraud-in-criminal-underground-8-1.png"></p><p><em><strong>Figure 8</strong>: Underground forum member discussing how to apply for fraudulent claims in Washington and Massachusetts</em></p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_9_1_8beb2a7450.png" alt="unemployment-fraud-in-criminal-underground-9-1.png"></p><p><em><strong>Figure 9</strong>: Underground member requesting a fake ID to commit Massachusetts unemployment fraud</em></p><h4 id="unemployment-fraud-targeting-and-attribution">Unemployment Fraud Targeting and Attribution</h4><p>In May 2020, researchers at the security firm Agari <a href="https://www.agari.com/email-security-blog/covid-19-unemployment-fraud-cares-act/" rel="noopener noreferrer" target="_blank">published</a> their findings regarding a Nigerian cybercriminal group tracked as Scattered Canary committing fraudulent unemployment and CARES Act claims throughout the U.S. The Scattered Canary cybercriminal group acts as a full-service business email compromise (BEC) operation that uses scams, such as email impersonation and phishing, to manipulate businesses into paying phony contracts and other fake invoices. Based on Agaris <a href="https://www.agari.com/email-security-blog/covid-19-unemployment-fraud-cares-act/" rel="noopener noreferrer" target="_blank">telemetry</a>, most of the targets were located in seven U.S. states: Florida, Massachusetts, North Carolina, Oklahoma, Rhode Island, Washington, and Wyoming. Threat actors associated with Scattered Canary were reported to have used a combination of prepaid cards to receive payments and mass-create email accounts:</p><ul><li><p>Overall, Scattered Canary <a href="https://www.agari.com/email-security-blog/covid-19-unemployment-fraud-cares-act/" rel="noopener noreferrer" target="_blank">used</a> at least 47 prepaid card accounts from Green Dot to receive the fraudulent payments. </p></li><li><p>Scattered Canary used Gmail <a href="https://www.agari.com/email-security-blog/covid-19-unemployment-fraud-cares-act/" rel="noopener noreferrer" target="_blank">accounts</a> to mass-create accounts on each target website. Because Google ignores periods when interpreting Gmail addresses, Scattered Canary is believed to have been able to create dozens of accounts on state unemployment websites and the IRS website dedicated to processing CARES Act payments for non-tax filers (freefilefillableforms[.]com). </p></li><li><p>Examples of the Gmail dot formatting structure used by Scattered Canary to send unemployment assistance phishing emails:</p></li><li><p>badactor2021@gmail[.]com</p></li><li><p>badactor202.1@gmail[.]com</p></li><li><p>badactor202.21@gmail[.]com</p></li><li><p>By using this tactic, Scattered Canary was able to scale their operations more efficiently by directing all communications to a single Gmail account. According to Agari, this removes the need to create and monitor a new email account for every account they create on a website, ultimately making transactions faster and more efficient.</p></li></ul><p>The targeting of state unemployment benefits was reported by Agari to be of interest to the group, which had specifically targeted Texas unemployment systems under nine identities as of May 2020. At this time, Recorded Future does not have further insight into how many of the fraudulent claims linked to Scattered Canary are being paid out by the individual states. However, a review of videos uploaded to messaging platforms selling state unemployment relief information did reveal a likely nexus to operators based in West Africa.</p><ul><li>One video uploaded to a fraud messaging platform revealed a likely member of the channel receiving a package from Samamiah (Shipping) Enterprise Limited, a shipping and delivery company that accepts goods for carriage (door-to-door) from the U.K. to Ghana. According to Agari, 10 percent of BEC fraud originated from Ghana between May 2019 and July 2020.</li></ul><p>Victim reports obtained by Recorded Future state that the requesters typically knew a targets name, SSN, and place of employment, but all the other data is static. In some scenarios reported to Recorded Future, requesters know the targets name, SSN, and place of employment, likely attempting to target executives or individuals of high networth. This is a common <a href="https://www.agari.com/cyber-intelligence-research/whitepapers/scattered-canary.pdf" rel="noopener noreferrer" target="_blank">technique</a> within BEC campaigns orchestrated by threat entities like Scattered Canary, which was first identified by Agari as a result of the threat entity impersonating an executive at Agari in an email targeting their chief financial officer. </p><p>Fraudulent unemployment claims within the U.S. are widespread enough that they are unlikely coming from a single threat entity. Threat actors have likely become emboldened by open source reports of the monetary impact that fraudulent unemployment claims continue to have. </p><p>Though this reporting focuses specifically on unemployment fraud circulating within closed source reporting, some opportunistic actors with little regard to maintaining operational security have also been observed advertising on traditional social media platforms. The large volume of open source reporting on the subject of unemployment fraud activity and losses estimated to be in the millions has very likely contributed to the growing level of interest and motivation among underground threat actors.</p><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_10_1_2fd4b6f360.jpg" alt="unemployment-fraud-in-criminal-underground-10-1.jpg"></p><p><em><strong>Figure 10</strong>: Social media ad for unemployment methods/tutorials</em></p><p>This level of interest has been reflected in multiple statistics reported across both the state and local levels of government since the start of December 2020.</p><ul><li><p>A follow-up <a href="https://krebsonsecurity.com/2020/08/hacked-data-broker-accounts-fueled-phony-covid-loans-unemployment-claims/" rel="noopener noreferrer" target="_blank">investigation</a> by KrebsOnSecurity in August 2020 reconfirmed that a group of scammers was likely sharing highly detailed personal and financial records of Americans via a free email service. Another undisclosed source informed KrebsOnSecurity that they had been monitoring the groups communications for several weeks and sharing the information with U.S. state and federal authorities in a bid to disrupt their fraudulent activity. Similar to earlier reports on the scale of these unemployment fraud campaigns, the source said the threat group appears to consist of several hundred individuals who collectively have stolen tens of millions of dollars from U.S. state and federal treasuries via phony loan applications with the U.S. Small Business Administration (SBA) and through fraudulent unemployment insurance claims made against several U.S. states.</p></li><li><p>This nexus to phony loan applications filed with the U.S. SBA is noteworthy given that it overlaps with the techniques of Scattered Canary operations detailed by Agari in May 2020.</p></li><li><p>In a <a href="https://www.latimes.com/california/story/2020-12-07/bank-of-america-estimate-2-billion-california-unemployment-fraud?utm_source=sfmc_100035609&utm_medium=email&utm_campaign=News+Alert%3a+Bank+of+America+warns+of+possible+%242+billion+in+California+unemployment+fraud+-+00000176&utm_term=https%3a%2f%2fwww.latimes.com%2fcalifornia%2fstory%2f2020-12-07%2fbank-of-america-estimate-2-billion-california-unemployment-fraud&utm_id=18806&sfmc_id=1739545" rel="noopener noreferrer" target="_blank">warning</a> to state legislators in December 2020, Bank of America estimated that fraud in Californias unemployment benefits system alone could now total $2 billion in losses. Bank of America stated they identified 640,000 accounts with suspicious activity that should be investigated to determine whether they are bogus and should be shut down.</p></li><li><p>The total number of members registered within underground channels devoted to unemployment fraud have been on the rise. One channel monitored by Recorded Future analysts had approximately 7,500 members at the beginning of November 2020. A month later, the total membership exceeded 18,000 members, with new messages uploaded by an administrator of the channel on a regular basis garnering several thousand views on average.</p></li></ul><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_11_1_33e98e4392.png" alt="unemployment-fraud-in-criminal-underground-11-1.png"></p><p><em><strong>Figure 11</strong>: States referenced in unemployment fraud ads in the underground since November 2020 (Source: Recorded Future)</em></p><h4 id="reliance-on-money-mules">Reliance on Money Mules</h4><p>Money mules likely remain a critical component of the unemployment fraud supply chain as evidenced by images uploaded by underground sellers of fraudulent unemployment methods and open source reports surrounding the arrests of suspected mules throughout 2020. The COVID-19 pandemic has forced reshipping mule operators to alter business strategies this year. A USSS advisory <a href="https://krebsonsecurity.com/2020/05/u-s-secret-service-massive-fraud-against-state-unemployment-insurance-programs/" rel="noopener noreferrer" target="_blank">reported</a> that the suspect fraud ring behind these filings already possessed a substantial PII database to submit the volume of applications observed earlier this year. Additionally, the USSS said the fraud network is believed to consist of hundreds of money mules. </p><p>Mules are essential for fraudsters who require a commodity to be physically moved from one place to another, or when fraudulent funds need to be moved between accounts. In money mule schemes, the scammers will also often recruit individuals to receive direct deposits from the fraudulent transactions, and then forward the bulk of the illicit funds to the perpetrators, keeping a percentage as payment for their efforts. The increased number of arrests around the country with a nexus to fraudulent unemployment relief claims has also provided clarity that multiple strings of fraudsters are likely operating independently with no direct nexus to any overseas operations.</p><ul><li><p>In September 2020, Attorney General (AG) Josh Shapiro of Pennsylvania (PA) <a href="https://local21news.com/news/local/ag-shapiro-to-announce-arrest-of-20-inmates-accomplices-involved-in-unemployment-fraud" rel="noopener noreferrer" target="_blank">announced</a> charges against 20 inmates and accomplices, charged with committing unemployment fraud in three state prisons in central and eastern Pennsylvania. The AGs office stated there were also six individual inmates arrested without any known links to a ring.</p></li><li><p>Posts from underground marketplace vendors observed as recently as October 2020 reveal that money mules likely play an integral part in assisting operations advertised on dark web sources.</p></li><li><p>On October 25, 2020, a member of the forum Omerta began advertising cash-out services for fraudulent unemployment claims in the U.S. The threat actor stated that their money mules (bank drops) can cash-out unemployment funds for a separately negotiated percentage of the bank transfer.</p></li></ul><p><img src="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_12_1_0d7745dc09.png" alt="unemployment-fraud-in-criminal-underground-12-1.png"></p><p><em><strong>Figure 12</strong>: Unemployment fraud 2020 arrest timeline (mainstream news sources) (Source: Recorded Future)</em></p><h3 id="mitigations">Mitigations</h3><p>A federal fraud investigator who <a href="https://krebsonsecurity.com/2020/05/u-s-secret-service-massive-fraud-against-state-unemployment-insurance-programs/" rel="noopener noreferrer" target="_blank">spoke</a> with KrebsOnSecurity in May 2020 on the condition of anonymity said many U.S. states do not have enough controls in place to detect patterns that might help better screen out fraudulent unemployment applications, such as looking for multiple applications involving the same IP addresses or bank accounts. The investigator went on to clarify that in some U.S. states, fraudsters need only to submit someones name, SSN, and other basic information for their claims to be processed. The investigator is <a href="https://krebsonsecurity.com/2020/05/u-s-secret-service-massive-fraud-against-state-unemployment-insurance-programs/" rel="noopener noreferrer" target="_blank">reported</a> to have implied that the list of questions about a claimants previous employer for authentication purposes, at some agencies, had diminished or been entirely eliminated as a result of the pandemic.</p><p>States have begun adopting their own individual measures to address the risk posed by this form of fraudulent activity. Representatives from states such as Massachusetts previously <a href="https://www.boston25news.com/news/health/state-warns-nationwide-unemployment-scam-targeting-mass-residents/TT3FOIDG2RFFRNTQRAMQU4IONM/" rel="noopener noreferrer" target="_blank">stated</a> that they had begun implementing additional identity verification measures that will temporarily delay the payment time frame for many unemployment claims. As a result of these measures, certain unemployment claimants may be asked to provide additional identity information in order to verify the validity of their claim.</p><p>Organizations that suspect their employees have fallen prey to unemployment fraud scams can do the following:</p><ul><li>Relay the information regarding this fraud to the appropriate office at your local state level and USSS field office. The USSS has also encouraged victims to continue to liaison with local financial institutions to identify mules and potential seizures.</li><li>Use features in monitoring software or applications that are capable of flagging potential spam or scams for payments in the app and sends text messages to users when it detects suspected fraud. Flagging potential criminal activity using tools and data sets to verify the identity of a claimant can help stop fraudulent activity before it begins.</li></ul><h3 id="outlook">Outlook</h3><p>In a number of cases, the most important component for unemployment or insurance claim fraud is access to victim PII. This type of information can be accessed and purchased on a number of dark web marketplaces, shops, and forums for fairly low prices by anyone with enough knowledge to set up an account on underground sources. It is difficult for us to determine which of these fraud types are being carried out with the greatest frequency based on available data. However, scam activities that depend on PII will likely continue to spike following the release of some larger data dumps, especially any that are widely publicized and easily accessible.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/unemployment_fraud_in_criminal_underground_07b3cb0afb.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Chinese State Media Seeks to Influence International Perceptions of COVID-19 Pandemic]]></title>
            <link>https://www.recordedfuture.com/covid-19-chinese-media-influence</link>
            <guid>https://www.recordedfuture.com/covid-19-chinese-media-influence</guid>
            <pubDate>Mon, 30 Mar 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future analyzed data from several Western social media platforms from January 1 to March 9, 2020 to determine how the Chinese state exploits social media to influence Western public perceptions of the coronavirus disease 2019 (COVID-19) outbreak. This report details those techniques and campaigns using data acquired from the Recorded Future® Platform, social media sites, and other OSINT techniques. This report will be of most value to government departments, geopolitical scholars and researchers, and all users of social media.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/Primary_Logo_Insikt_Digital_RGB_45f99b2dc9.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p><em><a href="https://go.recordedfuture.com/hubfs/reports/cta-2020-0330.pdf" rel="noopener noreferrer" target="_blank">Click here</a> to download the complete analysis as a PDF.</em></p><p><em>Recorded Future analyzed data from several Western social media platforms from January 1 to March 9, 2020 to determine how the Chinese state exploits social media to influence Western public perceptions of the coronavirus disease 2019 (COVID-19) outbreak. This report details those techniques and campaigns using data acquired from the Recorded Future Platform, social media sites, and other OSINT techniques. This report will be of most value to government departments, geopolitical scholars and researchers, and all users of social media.</em></p><h3 id="executive-summary">Executive Summary</h3><p>Over the course of 2019, we published <a href="https://www.recordedfuture.com/china-social-media-operations/">research</a> on Chinese English-language social media influence operations, revealed that they are seeded by state-run media, and that they generally present a positive, benign, and cooperative image of China. This research  examines Chinese influence attempts during the novel coronavirus, known as the coronavirus disease 2019 (COVID-19) outbreak, and is an effort to characterize Chinese state-run medias attempts to influence Western public perceptions of the pandemic.</p><p>Chinese overt messaging around COVID-19 has evolved over the course of this pandemic. Insikt Groups research has identified two distinct phases of Chinese overt messaging. The first, from January 9 through February 10, consisted of an initially informative public response that followed the progression of the outbreak. The second, from February 11 to the present, was characterized by shifts  shifting the blame for the pandemic away from the Chinese government, highlighting the prominence of Xi Jinping as the leader of effective response, and shifting from China as the source of the pandemic to China as a global leader in its response.</p><h3 id="key-judgments">Key Judgments</h3><ul><li>We assess that the effort we see today to <a href="http://www.xinhuanet.com/english/2020-03/17/c_138887577.htm" rel="noopener noreferrer" target="_blank">cast doubt on the origin of COVID-19</a> and <a href="https://twitter.com/zlj517/status/1238306822957588480" rel="noopener noreferrer" target="_blank">shift the blame away from China</a> began in mid-February with the transition away from the use of Wuhan-specific hashtags in COVID-19 posts.</li><li>Chinese overt influence accounts did not address the COVID-19 crisis until January 9, 2020. This was nine days after the Wuhan Health Commission declared the outbreak, yet <a href="http://chinamediaproject.org/2020/01/30/too-busy-for-an-epidemic/" rel="noopener noreferrer" target="_blank">11 days before national-level state media</a> would acknowledge the crisis domestically on January 21.</li><li>Sentiment and content analysis revealed that Chinese state-run influence accounts waged a broadly positive messaging campaign on Western social media. However, messaging surrounding COVID-19 was starkly more negative than around campaigns we have previously studied.</li><li>Contrary to other English-language social media campaigns that we have tracked, the numbers of positive and negative sentiment posts were nearly the same. Additionally, as the number of both negative and positive posts increased, the strength of the negative and positive sentiment did as well. Comparatively, we assess that this COVID-19 campaign was far more negative than prior Western-focused influence operations run by China.</li></ul><h3 id="background">Background</h3><p>According to the World Health Organization, the novel coronavirus, known as coronavirus disease 2019 (COVID-19), was first <a href="https://www.who.int/emergencies/diseases/novel-coronavirus-2019" rel="noopener noreferrer" target="_blank">reported</a> as originating from Wuhan, China on December 31, 2019. COVID-19 is a viral, respiratory disease that has spread throughout the world, causing fear and panic as the outbreak progresses. To date, hundreds of thousands of people have been <a href="https://www.arcgis.com/apps/opsdashboard/index.html#/bda7594740fd40299423467b48e9ecf6" rel="noopener noreferrer" target="_blank">infected</a> across the world, and tens of thousands have died.</p><p>Insikt Group conducted a retrospective analysis of numerous accessible, non-Chinese language social media posts from accounts run by Chinese state-run media organizations and associated foreign influence accounts on Western social media platforms. The data set includes posts from several social media platforms from January 1 through March 9, 2020 that included terminology related to COVID-19. There were no mentions of COVID-19 among Chinese overt influence accounts prior to January 9, 2020.</p><h3 id="analysis">Analysis</h3><p>As of March 9, 2020, Chinese overt influence accounts had published over 32,000 posts related to COVID-19 on several Western social media platforms. Nearly half of all posts from Chinese overt influence accounts since January 9 mention coronavirus or COVID-19. </p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_1_1_41e7717e42.png" alt="covid-19-chinese-media-influence-1-1.png"></p><p>The progression of Chinese overt influence account messaging around the COVID-19 outbreak on Western social media platforms.</p><p>Chinese overt influence accounts first addressed COVID-19, then known as the previously unidentified pneumonia outbreak, on January 9. This was the same day that the World Health Organization (WHO) <a href="https://www.who.int/china/news/detail/09-01-2020-who-statement-regarding-cluster-of-pneumonia-cases-in-wuhan-china" rel="noopener noreferrer" target="_blank">announced</a> that Chinese authorities had determined the illness was a novel coronavirus. The WHO announcement included several complimentary statements about Chinas healthcare system and ability to respond to outbreaks, as well as an assurance that the virus does not transmit readily between people.<sup>1</sup> Several state-run influence accounts, including the Peoples Daily, CGTN, Global Times, and China Daily, all posted their first social media content concerning the outbreak on the morning of January 9 (GMT).</p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_2_1_a9488d232c.png" alt="covid-19-chinese-media-influence-2-1.png"></p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_3_1_313d791df4.png" alt="covid-19-chinese-media-influence-3-1.png"></p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_4_1_e9fb9939f8.png" alt="covid-19-chinese-media-influence-4-1.png"></p><p>Examples of the first posts addressing COVID-19 posted by Chinese state-run influence accounts.</p><p>Over the course of the first five days of messaging, Chinese overt influence accounts repeatedly emphasized two points: First, that China was being transparent and helpful to the international community, and second, that the spread of the virus to new areas was limited.</p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_5_1_60b0586465.png" alt="covid-19-chinese-media-influence-5-1.png"></p><p>An example post from a Chinese state-run influence account addressing COVID-19.</p><p>As January progressed, Chinese overt influence accounts continued to minimize the outbreak and the potential for human-to-human transmission despite the confirmation on January 20 <a href="https://www.globaltimes.cn/content/1177510.shtml" rel="noopener noreferrer" target="_blank">by Chinese officials</a> that it was occurring.</p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_6_1_8fe2e1e3ad.png" alt="covid-19-chinese-media-influence-6-1.png"></p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_7_1_5a503d2682.png" alt="covid-19-chinese-media-influence-7-1.png"></p><p>Examples of posts addressing COVID-19 posted by Chinese state-run influence accounts.</p><p>Further, Chinas role in containing the virus and working with the international community continued to feature prominently in social media messaging. This included posts on the Chinese government setting up resources to share information on the virus, Chinese cooperation with the WHO, and Chinese companies increasing production of medical supplies.</p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_8_1_68f80b47c2.png" alt="covid-19-chinese-media-influence-8-1.png"></p><p>An example of a post by a Chinese state-run influence account addressing how Chinese companies were responding to COVID-19.</p><p>By late January, the volume of posts concerning COVID-19 by Chinese overt influence accounts operating on Western social media spiked dramatically. Themes of the posts emphasized economic and price stability, the everyday heroism of nurses and doctors working the epidemic, and Chinas transparent and positive role in addressing the crisis. </p><p>By early February, as the disease <a href="https://www.bbc.com/news/world-asia-51381594" rel="noopener noreferrer" target="_blank">spread to cruise ships</a> and numbers of deaths increased, the messaging from overt influence accounts began to shift. The efforts of the government and Xi Jinping were highlighted with greater frequency, and overt influence accounts highlighted statements of corporate support for Chinese government efforts.  </p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_9_1_3c50e4572a.png" alt="covid-19-chinese-media-influence-9-1.png"></p><p>An example of a post addressing COVID-19 from Chinese state-run influence accounts.</p><p>Among the top 20 hashtags used by Chinese overt influence accounts through mid-February, only two  #Shanghai and #XiJinping  were not related to the COVID-19 crisis. Shanghai-focused posts highlighted public health measures and indicators of economic stability, while Xi Jinping-focused posts spotlighted his domestic and international leadership.</p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_10_1_6c3c489ebc.png" alt="covid-19-chinese-media-influence-10-1.png"></p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_11_1_1c43011351.png" alt="covid-19-chinese-media-influence-11-1.png"></p><p>Examples of posts addressing COVID-19 from Chinese state-run influence accounts.</p><p>By late February and early March, overt influence account messaging shifted again, with the following themes remaining consistent:</p><ul><li>China has successfully managed the outbreak and its response should be the model for containing the spread of the virus in other countries. Some sub-themes of this message include: (1) China has a better system of governance, which enabled it to respond better and faster than the West; and (2) now that Chinas outbreak is over, it is Chinas turn to help the world (China as a good global citizen).</li><li>The West is using COVID-19 as an excuse and a tool to contain Chinas rise.</li><li>Origins of COVID-19 are unclear and the Chinese government is not at fault.</li></ul><p>In the early days of the outbreak, Chinese overt influence accounts were using several hashtags to post about COVID-19. The top hashtags used to describe the virus in January and early February included:</p><ul><li>#wuhancoronavirus</li><li>#wuhanpneumonia</li><li>#coronavirusoutbreak</li><li>Combinations of #wuhan, #coronavirus, and #novelcoronavirus</li></ul><p>By February 11, all Chinese overt influence accounts had stopped using the #wuhancoronavirus and #wuhanpneumonia hashtags completely. They were instead replaced with #covid19 and #coronavirus. At this point, the accounts also started to address both real and perceived misinformation around the origin of the virus and its global and financial impacts.</p><p>For example, in late February, overt influence accounts tried to <a href="https://www.globaltimes.cn/content/1180037.shtml" rel="noopener noreferrer" target="_blank">disprove the theory</a> that the Wuhan Institute of Virology was the original source of the COVID-19 virus. </p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_12_1_c257b52f9f.png" alt="covid-19-chinese-media-influence-12-1.png"></p><p>An example of a post from Chinese state-run influence accounts addressing the actions taken by the Wuhan Institute of Virology.</p><p>Simultaneously, accounts began to post content decrying the politicization of the pandemic and the blame many nations were placing on China. We assess that these posts in February were the beginning of the effort we see today to <a href="http://www.xinhuanet.com/english/2020-03/17/c_138887577.htm" rel="noopener noreferrer" target="_blank">cast doubt</a> on the origin of COVID-19 and shift the blame away from China by promoting <a href="https://twitter.com/SecPompeo/status/1238337488856506369" rel="noopener noreferrer" target="_blank">conflicts over virus</a> <a href="https://bitterwinter.org/de-sinicizing-the-virus-how-ccp-propaganda-is-rewriting-history/" rel="noopener noreferrer" target="_blank">naming convention</a>.</p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_13_1_5f808a53ef.png" alt="covid-19-chinese-media-influence-13-1.png"></p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_14_1_d8b484e63e.png" alt="covid-19-chinese-media-influence-14-1.png"></p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_15_1_6fcf5e440f.png" alt="covid-19-chinese-media-influence-15-1.png"></p><p>Examples of posts from Chinese state-run influence accounts shifting attention away from China.</p><h3 id="sentiment-analysis">Sentiment Analysis</h3><p>Insikt Group also conducted a sentiment analysis of Chinese overt messaging on COVID-19 during this time period. Sentiment analysis assigns a number value to a message based on a set of established lexical rules. These rules position certain words, phrases, word placement, punctuation, and other vagaries of human speech into sets, which then score messages based on these inputs. </p><p>Recorded Future proprietary sentiment analysis assigns a score to each message based on the strength of sentiment within the message. On a scale from zero to one, a message with a strongly positive sentiment would yield a higher number on the positive sentiment metric (.675, for example) and a message with a strongly negative sentiment would yield a higher number for the negative sentiment metric (again, .675, for example).</p><p>Below are two examples  first of content that was scored as highly positive, and second of content that was scored as highly negative.</p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_16_1_a4c1101c62.png" alt="covid-19-chinese-media-influence-16-1.png"></p><p>Example of a post that was scored as highly positive.</p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_17_1_7b46ae2885.png" alt="covid-19-chinese-media-influence-17-1.png"></p><p>Example of a post that was scored as highly negative.</p><p>Over the course of the messaging campaign surrounding COVID-19, Chinese overt influence accounts projected an overall positive message. Contrary to other English-language social media campaigns that we have tracked, the numbers of positive and negative sentiment posts were nearly the same. There were only 6% more positive sentiment posts than negative sentiment ones through March 9. Over that time frame, as the number of both negative and positive posts increased, the strength of the negative and positive sentiment did as well. </p><p><img src="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_18_1_caa269c14e.png" alt="covid-19-chinese-media-influence-18-1.png"></p><p>The progression of Chinese overt influence account messaging sentiment around the COVID-19 outbreak on Western social media platforms.</p><h3 id="outlook">Outlook</h3><p>This research examines Chinese state-run influence attempts during a critical period for Chinese leadership. It is an effort to characterize how Chinese state-run media is attempting to influence Western public perceptions of one timely issue  the COVID-19 pandemic. </p><p>To date, Chinese overt messaging around COVID-19 has evolved over the course of this pandemic. Insikt Groups research has identified two distinct phases of Chinese overt messaging. The first, from January 9 through February 10, was the initial, largely informative public response. We believe that during this period, Chinese Communist Party censors and propagandists had not yet communicated coordinated guidelines for foreign messaging by state-run media. </p><p>The second, from February 11 to the present, is characterized by shifts  shifting the blame for the pandemic away from the government, shifting the prominence of Xi Jinping as the leader of effective response, and shifting from China as the source of the pandemic to China as a global leader in its response.</p><p>We believe it is important to continue to research Chinese influence operations on Western social media platforms for purposes of fact checking, countering blatantly false or misleading information, and to gain a greater understanding of how the Chinese Communist Party and government react in a public emergency. Our series of research pieces on this topic, as well as the work of others, have illuminated a general pattern in Chinese leadership crisis messaging on Western social media platforms. This pattern indicates that in the early days of a crisis, social media posts from state-run organizations are likely at their most transparent and accurate. The utility of social media posts are high at first, as they give early insight into a crisis, but degrade over time as the propaganda machine kicks in to influence the message being sent abroad.</p><h4 id="footnotes">Footnotes</h4><p><sup>1</sup>This assertion has since been disputed, and the CDC states that COVID-19 seems to be spreading easily and sustainably in the community.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/covid_19_chinese_media_influence_b97adf75ff.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Combating the Underground Economy's Automation Revolution]]></title>
            <link>https://www.recordedfuture.com/underground-economy-automation</link>
            <guid>https://www.recordedfuture.com/underground-economy-automation</guid>
            <pubDate>Tue, 24 Mar 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[Automation has become an essential part of nearly every industry, and nowhere is this more true than in cybersecurity. But unfortunately, the benefits of automation are equally available to criminal enterprises and defenders alike. ]]></description>
            <content:encoded><![CDATA[<p>Automation has become an essential part of nearly every industry, and nowhere is this more true than in cybersecurity. But unfortunately, the benefits of automation are equally available to criminal enterprises and defenders alike. So while the criminal underground has created an ecosystem of tools and resources to operationalize and monetize campaigns, SOARs can be used to tip the balance back in a defenders favor by automating defensive intelligence feeds and combining them with automated detection and prevention.</p><p><a href="https://go.recordedfuture.com/automation-report" rel="noopener noreferrer" target="_blank">Research by Recorded Futures Insikt Group</a> explored the tools and services used by threat actors to automate tasks associated with malicious campaigns and the mitigation strategies available through SOAR and threat intelligence solutions. </p><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_1_1_6f5c2e910d.gif" alt="underground-economy-automation-1-1.gif"></p><p>Cyberattacks frequently start with a compromised network or a database of credentials as a result of threat actors obtaining unauthorized access to a network, who then sell credentials on underground forums. This access can be used for privilege escalation within the network, business email compromise, ransomware, and other types of attacks.</p><p>Mitigation strategies include:</p><ul><li>Keeping all software and applications up to date</li><li>Filtering emails for spam and scrutinizing links and attachments</li><li>Making regular backups of systems, and storing them offline</li><li>Compartmentalizing company-sensitive data</li><li>Instituting role-based access</li><li>Applying data encryption standards</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_2_2_b35c0eba74.gif" alt="underground-economy-automation-2-2.gif"></p><p>Attackers with credentials obtained by data breaches then leverage checkers and brute-forcers to direct large-scale automated login requests to determine the validity of victims or gain unauthorized access through a credential stuffing attack for thousands of accounts.</p><p>Mitigation strategies include:</p><ul><li>Using unique passwords for accounts, in addition to a password manager</li><li>Requiring additional details for login (e.g., CAPTCHA) or require multi-factor authentication (MFA)</li><li>Establishing customized web application firewalls</li><li>Slowing date or rate limit login traffic</li><li>Removing unused public-facing logins</li><li>Baselining traffic and network requests to monitor for unexpected traffic</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_3_1_0549c109d9.gif" alt="underground-economy-automation-3-1.gif"></p><p>Threat actors will also apply loaders and crypters to elude detection by endpoint security products, such as antivirus, and then download and execute one or more malicious payloads, such as malware. </p><p>Mitigation strategies include:</p><ul><li>Updating antivirus software regularly</li><li>Implementing additional response and detection controls beyond antivirus to detect malicious payloads</li><li>Training and educating individuals on phishing and associated risks</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_4_1_874367c675.gif" alt="underground-economy-automation-4-1.gif"></p><p>Stealers and keyloggers are used to exfiltrate sensitive information from victims, including credentials, PII, and payment card information, and install secondary payloads onto victims systems.</p><p>Mitigation strategies include:</p><ul><li>Investing in solutions offering patch posture reporting</li><li>Configuring network defense mechanisms to alert of malicious activity on devices</li><li>Monitoring for suspicious changes to file drives and registries</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_5_1_314960155e.gif" alt="underground-economy-automation-5-1.gif"></p><p>Automating the process by not having to write their own script, threat actors can easily obtain banking injects, which are widely published, popular, and powerful tools for performing fraud. Fake overlays or modules are used with banking trojans to inject HTML or JavaScript code to collect sensitive information before redirecting to a legitimate website. </p><p>Mitigation strategies include:</p><ul><li>Keeping software and applications up to date</li><li>Installing antivirus solutions, scheduling updates, and monitoring the antivirus status on all equipment</li><li>Enabling MFA via SMS authenticator applications</li><li>Solely using HTTPS connection</li><li>Educating employees and conducting training sessions</li><li>Deploying spam and web filters</li><li>Encrypting all sensitive company information</li><li>Disabling HTML or converting HTML email into text-only email</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_6_1_51714d4005.gif" alt="underground-economy-automation-6-1.gif"></p><p>Used to automate the exploitation of web browser vulnerabilities to maximize the delivery of successful infections, exploit kits deliver malicious payloads such as trojans, loaders, ransomware, and other malicious software. </p><p>Mitigation strategies include:</p><ul><li>Prioritizing the patching of Microsoft products and older vulnerabilities in the technology stack</li><li>Ensuring that Adobe Flash Player is automatically disabled in browser settings</li><li>Conducting and maintaining phishing security awareness</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_7_1_17f661b347.gif" alt="underground-economy-automation-7-1.gif"></p><p>Threat actors leverage spamming and phishing services to conduct email campaigns that give them access to hundreds of thousands of victims to deploy malware or gain further access into a network. </p><p>Mitigation strategies include:</p><ul><li>Refraining from publishing your email address online or replying to spam messages</li><li>Downloading additional spam filtering tools and antivirus software</li><li>Avoiding using personal or business email addresses when registering online</li><li>Developing a password security policy</li><li>Requiring encryption for all employees</li><li>Educating employees and conduct training sessions</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_8_1_e311dd7807.gif" alt="underground-economy-automation-8-1.gif"></p><p>To extend the longevity of their criminal actions, threat actors leverage proxy and bulletproof hosting services (BPHS) to obfuscate their activities. BPHS provide secure hosting for malicious content and activity, and anonymity by relying on a model that promises not to comply with legal requests that would disrupt operations or result in arrests.</p><p>Mitigation strategies include:</p><ul><li>Leveraging threat intelligence platforms, like Recorded Future, to assist in the monitoring of malicious service providers</li><li>Blacklisting servers affiliated with known-malicious BPHSs</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_9_1_141ff48f8c.gif" alt="underground-economy-automation-9-1.gif"></p><p>In the underground economy, sniffers refer to a type of malware written in JavaScript that are designed to infiltrate and steal card-not-present (CNP) data from the checkout pages of e-commerce websites.</p><p>Mitigation strategies include:</p><ul><li>Performing regular audits of a website to identify suspicious scripts or network behavior</li><li>Preventing non-essential, externally loaded scripts from loading on checkout pages</li><li>Evaluating third-party plugins on an e-commerce website and monitoring for changes in their code or behavior</li></ul><p><img src="https://cms.recordedfuture.com/uploads/underground_economy_automation_10_1_8b83976edd.gif" alt="underground-economy-automation-10-1.gif"></p><p>In order to monetize the content that threat actors have acquired, they sell stolen data in online credit card shops, account shops, and marketplaces. Money is made through the buying and selling of credentials for bank accounts, cell phone accounts, online store accounts, dating accounts, and even digital fingerprints of compromised systems to facilitate further breaches. </p><p>Mitigation strategies include:</p><ul><li>Monitoring shops and marketplaces for accounts relevant to your enterprise</li><li>Acting on spikes in the number of accounts available in shops</li><li>Paying attention to credentials for non-public facing domains</li><li>Enabling MFA via SMS authenticator applications</li></ul><p>For more information on the 10 types of tools and services currently used by threat actors to automate tasks, and suggested mitigations for defenders to implement, check out the full report by Recorded Futures Insikt Group, <a href="https://go.recordedfuture.com/automation-report" rel="noopener noreferrer" target="_blank">Automation and Commoditization in the Underground Economy</a>.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/underground_economy_automation_32df24375d.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[The Price of Influence: Disinformation in the Private Sector]]></title>
            <link>https://www.recordedfuture.com/disinformation-service-campaigns</link>
            <guid>https://www.recordedfuture.com/disinformation-service-campaigns</guid>
            <pubDate>Mon, 30 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group analyzed threat actors offering disinformation as a service on underground forums to understand how disinformation is used by cybercriminals.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/Primary_Logo_Insikt_Digital_RGB_45f99b2dc9.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p><!--HubSpot Call-to-Action Code --><span class="hs-cta-wrapper" id="hs-cta-wrapper-b5b2cabf-6ced-4285-8e4d-5f1ae116a788"><span class="hs-cta-node hs-cta-b5b2cabf-6ced-4285-8e4d-5f1ae116a788" id="hs-cta-b5b2cabf-6ced-4285-8e4d-5f1ae116a788" style="visibility: visible;" data-hs-drop="true"><a id="cta_button_252628_e66302f9-069a-4912-bbae-b066894e9196" class="cta_button " href="https://go.recordedfuture.com/cs/c/?cta_guid=e66302f9-069a-4912-bbae-b066894e9196&amp;signature=AAH58kFA6GkEsf_y-CQEkEr0fUge8TpGbw&amp;placement_guid=b5b2cabf-6ced-4285-8e4d-5f1ae116a788&amp;click=000c2e43-9131-42b2-b1b7-2d1d5ce41316&amp;hsutk=5553cc7ab65e9c944084cec13e2f0ef3&amp;canon=https%3A%2F%2Fwww.recordedfuture.com%2Fdisinformation-service-campaigns%2F&amp;portal_id=252628&amp;redirect_url=APefjpHYL8ISxQa8uXMRJwmsYbXol6m4x7E6tcsq1m4kovzmk4XoJr2_nlfY0Tf4Rl3sAWgUhpD-_fEGzC2nM_bgJ1nm641_oh0yOg6Lk6w4WHp-HOmfBNBJPocFtLvlt-efjaMCGnkuQULs2R05VCWIkVNdeF4CwdDv4A6znyV-MTQmCdIgKNzP-CZK-VPwavkoGjNbfl7mpgubOGGkFigj3A7Oi7YJISOxG1R-OCThDK0OE_mV21rmBXZZem3__7yynPf1U7sEqS4oprq_64w_3_XbL3LkzQ&amp;__hstc=46213176.5553cc7ab65e9c944084cec13e2f0ef3.1671648639165.1672950104652.1673027433871.8&amp;__hssc=46213176.1.1673027433871&amp;__hsfp=56776049" style="" cta_dest_link="https://go.recordedfuture.com/hubfs/reports/cta-2019-0930.pdf" title="Click here">Click here</a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(252628, 'b5b2cabf-6ced-4285-8e4d-5f1ae116a788', {}); </script></span><!-- end HubSpot Call-to-Action Code --> to download the complete analysis as a PDF.</p><p><em>Insikt Group used the Recorded Future Platform, proprietary sources, and underground forum analysis to provide deeper insight into the operations of two of the more sophisticated disinformation vendors on Russian-speaking underground forums. To test the operational capabilities of these vendors, Insikt Group engaged with one threat actor to generate positive disinformation and the other for negative disinformation, both directed at a fictitious company we created.</em></p><em><p>This report will be of interest to private, public, and political organizations concerned with disinformation campaigns, as well as those interested in how threat actors create and distribute disinformation content throughout the internet.</p></em><p><em><strong>Editors Note</strong>: In order to protect Recorded Future sources and operations, this report will use pseudonyms for all involved parties, identifying the threat actors involved with the code names Raskolnikov and Doctor Zhivago, while the fictitious company involved will be identified as Tyrell Corporation for the purposes of this report.</em></p><h3>Executive Summary</h3><p>Insikt Group analyzed the operations of two threat actors who were offering disinformation as a service on Russian-speaking underground forums in order to understand the business model of how disinformation is used by cybercriminals, as opposed to nation-states. To do so, we created a fictitious company and commissioned two different threat actors to generate intentionally false narratives across the web.</p><p>One threat actor created propaganda in the form of positive PR to make our company seem appealing, while the other generated malicious material accusing that same company of unethical business practices. In the end, we were able to launch both campaigns in less than a month for only a few thousand dollars.</p><h3>Key Judgments</h3><ul><li>Disinformation services are publically available on underground criminal forums and are run by criminal threat actors and nation-states.</li><li>Disinformation services are highly customizable in scope, costing anywhere from several hundreds of dollars to hundreds of thousands of dollars, or more depending on the clients needs.</li><li>Disinformation service providers have the ability to publish articles in media sources ranging from dubious websites to more reputable news outlets.</li><li>Disinformation service providers have the ability to create and maintain social media accounts in bulk and use a combination of both established and new accounts to propagate content without triggering content moderation controls.</li></ul>    <p><img src="https://cms.recordedfuture.com/uploads/disinformation_service_campaigns_1_1_326d77b88b.jpg" alt="disinformation-service-campaigns-1-1.jpg"></p><h3>Threat Analysis</h3><p>Disinformation has been a tactic used in information warfare commonly associated with the statecraft of the Soviet Union throughout the Cold War. Disinformation, or <em>dezinformatsiya</em>, is defined by the Great Soviet Encyclopedia as false information with the intention to deceive public opinion. The term was coined by Joseph Stalin, and even the word itself was a form of disinformation; according to Soviet defector Ion Mihai Pacepa, Stalin deliberately gave it a French-sounding name in order to claim that both the term and the tactic originated in Western Europe and was a tool used by the Capitalist Imperialists to destroy Communism and the workers paradise.</p><p>Disinformation operations have existed throughout history and have been used by kings, dictators, and governments throughout the world. Octavian wielded propaganda to destroy the reputation of Mark Antony during the last of the Roman civil wars. The Soviet Union launched a multitude of campaigns slandering Pope Pious XII as Hitlers Pope and distributed copies of the antisemitic Protocols of the Elders of Zion throughout Islamic regions of the world to foster religious tensions.<sup>1</sup> In another campaign, the USSR spread a conspiracy theory via Indian news outlets that the United States had developed the AIDS virus in a laboratory as a biological weapon.<sup>2</sup> The Reich Ministry of Propaganda and Public Enlightenment headed by Joseph Goebbels in Nazi Germany spread propaganda throughout Germany and its occupied territories. <a href="https://www.justice.gov/file/1035477/download" rel="noopener noreferrer" target="_blank">Recent disinformation campaigns</a> include attacks against the 2016 and 2018 U.S. elections by the Russian intelligence services, including the GRU and SVR, along with Kremlin-backed media sites RT and Sputnik News.</p><p>While in recent years there has been an increased focus on state-sponsored disinformation campaigns, Recorded Future identified that there is also a private-sector market for disinformation and threat actors who are ready to provide the services to those who are willing to pay. In particular, Recorded Future analysts have identified established threat actors operating in the Russian-speaking underground forums offering these services. There, Insikt Group discovered two threat actors advertising such services. For the sake of this report, we will refer to them as Doctor Zhivago and Raskolnikov. To put their skills to the test, we decided to create a fictitious company located in a Western country to use as our target. We will refer to this company as Tyrell Corporation. </p><p>We wanted to investigate both aspects of the disinformation spectrum, so we hired Raskolnikov to market Tyrell Corporation with positive PR, and Doctor Zhivago to do the opposite. In Doctor Zhivagos case, they proposed spreading invented stories of misconduct and poor business practices to damage the reputation of Tyrell Corporation. In the end, both Raskolnikov and Doctor Zhivago delivered on their promises, and Insikt Group discovered that disinformation campaigns, even against a Western company using Western media, could be launched in a timely and affordable manner.</p><p>Launching a disinformation campaign was a simple process, and both Raskolnikov and Doctor Zhivago were very informative and helpful. Their services were advertised on popular Russian-language underground forums, where they listed their Jabber and Telegram handles for all to see. Both actors had pricing models showing the cost of content generation so you could budget out your disinformation campaign. Doctor Zhivagos services were priced very specifically, as seen below:</p><ul><li>$15 for an article up to 1,000 characters</li><li>$8 for social media posts and commentary up to 1,000 characters</li><li>$10 for Russian to English translation up to 1,800 characters</li><li>$25 for other language translation up to 2,000 characters</li><li>$1,500 for SEO services to further promote social media posts and traditional media articles, with a time frame of 10 to 15 days</li></ul><p>Raskolnikov, on the other hand, had less specific pricing:</p><ul><li>$150 for Facebook and other social media accounts and content</li><li>$200 for LinkedIn accounts and content</li><li>$350$550 per month for social media marketing</li><li>$45 for an article up to 1,000 characters</li><li>$65 to contact a media source directly to spread material</li><li>$100 per 10 comments for a given article or news story</li></ul><p>We contacted Raskolnikov claiming to be a business owner who needed some media attention for their new company: Tyrell Corporation. Shortly thereafter, we used a different alias to contact Doctor Zhivago, claiming to have a personal grudge against the Tyrell Corporation, who we competed with, and needing Doctor Zhivagos services accordingly. </p><p>Both Raskolnikov and Doctor Zhivago were true salespeople. They patiently answered question after question about what they would do and how they would do it, even providing samples of what they had done in previous operations. After our objectives were agreed upon and payment was made, first our positive and then our negative disinformation campaigns were launched targeting the Tyrell Corporation. In all, the process took less than a month.</p><p>Raskolnikov created accounts for Tyrell Corporation on several social media platforms and gathered a following of over 100 users for each account on various platforms. The profiles generally appeared authentic, using images and names of managers from Tyrell Corporations website. At this time, we are unsure how many of the followers were trolls or bots, but we did see what appeared to be comments from real people asking questions about the company. This led us to believe that it was probably a combination of both: bots, or trolls, spreading disinformation content that was picked up by real users. There is really nothing suspicious about the Tyrell Corporations social media accounts aside from it being a new company.</p><p>The next step was publishing articles in the media. Raskolnikov informed us that we could essentially publish as many articles praising our new company as we wanted, so we chose to start with two. Raskolnikov wrote up two separate articles with essentially identical content, and sent them to us for review before publication. The articles were generic, announcing our new, wonderful company  Tyrell Corporation  to the world, and why we were better than the rest. However, the writing was not at the level of a native English speaker and we had Raskolnikov rewrite the articles multiple times until we felt the language could pass for a genuine article in an English-language media outlet.</p><p>Raskolnikov provided the following price list for publications where articles could allegedly be published for a U.K.-based disinformation promotion campaign:</p><table><tbody><tr><th>Number</th><th>Source</th><th>Price</th></tr><tr><th>1</th><th>cheapautoinsuranceee[.]com</th><th>$180.00</th></tr><tr><th>2</th><th>taftcollege[.]org</th><th>$180.00</th></tr><tr><th>3</th><th>loan-st[.]com</th><th>$200.00</th></tr><tr><th>4</th><th>marketingwithmiles[.]com</th><th>$220.00</th></tr><tr><th>5</th><th>entrepreneurshiplife[.]com</th><th>$250.00</th></tr><tr><th>6</th><th>traveltweaks[.]com</th><th>$250.00</th></tr><tr><th>7</th><th>bluntmoney[.]com</th><th>$250.00</th></tr><tr><th>8</th><th>lovebelfast[.]co[.]uk</th><th>$250.00</th></tr><tr><th>9</th><th>housingpedia[.]com</th><th>$250.00</th></tr><tr><th>10</th><th>makemoneysaving[.]com</th><th>$250.00</th></tr><tr><th>11</th><th>herjobs[.]com</th><th>$250.00</th></tr><tr><th>12</th><th>brussels[.]com</th><th>$500.00</th></tr><tr><th>13</th><th>savingadvice[.]com</th><th>$630.00</th></tr><tr><th>14</th><th>seethru[.]co[.]uk</th><th>$600.00</th></tr><tr><th>15</th><th>aboutmanchester[.]co[.]uk</th><th>$600.00</th></tr><tr><th>16</th><th>abcmoney[.]co[.]uk</th><th>$600.00</th></tr><tr><th>17</th><th>calculator[.]co[.]uk</th><th>$600.00</th></tr><tr><th>18</th><th>filmoria[.]co[.]uk</th><th>$600.00</th></tr><tr><th>19</th><th>flatpackhouses[.]co[.]uk</th><th>$600.00</th></tr><tr><th>20</th><th>newstoday[.]co[.]uk</th><th>$600.00</th></tr><tr><th>21</th><th>soundItout[.]co[.]uk</th><th>$600.00</th></tr><tr><th>22</th><th>teamtalk[.]com</th><th>$448.18</th></tr><tr><th>23</th><th>sundaypost[.]com</th><th>$567.43</th></tr><tr><th>24</th><th>glassofbubbly[.]com</th><th>$445.00</th></tr><tr><th>25</th><th>breakingtravelnews[.]com</th><th>$500.00</th></tr><tr><th>26</th><th>ninetyminutesonline[.]com</th><th>$505.00</th></tr><tr><th>27</th><th>stories.swns[.]com</th><th>$508.75</th></tr><tr><th>28</th><th>angliya[.]com</th><th>$791.25</th></tr><tr><th>29</th><th>thefintechtimes[.]com</th><th>$810.00</th></tr><tr><th>30</th><th>eatsleepsport[.]com</th><th>$713.75</th></tr><tr><th>31</th><th>trustedreviews[.]com</th><th>$8,405.30</th></tr><tr><th>32</th><th>dezeen[.]com</th><th>$3,416.37</th></tr><tr><th>33</th><th>order-order[.]com</th><th>$1,928.34</th></tr><tr><th>34</th><th>thecourier[.]co[.]uk</th><th>$1,021.50</th></tr><tr><th>35</th><th>eveningexpress[.]co[.]uk</th><th>$832.14</th></tr><tr><th>36</th><th>wallpaper[.]com</th><th>$8,404.80</th></tr><tr><th>37</th><th>eveningtimes[.]co[.]uk</th><th>$1,260.00</th></tr><tr><th>38</th><th>londonist[.]com</th><th>$3,469.60</th></tr><tr><th>39</th><th>worldtravelguide[.]net</th><th>$2,081.60</th></tr><tr><th>40</th><th>thelondoneconomic[.]com</th><th>$740.80</th></tr><tr><th>41</th><th>research-live[.]com</th><th>$1,260.00</th></tr><tr><th>42</th><th>examinerlive[.]co[.]uk</th><th>$631.20</th></tr><tr><th>43</th><th>accessaa[.]co[.]uk</th><th>$1,260.00</th></tr><tr><th>44</th><th>ft[.]com</th><th>$49,440.00</th></tr><tr><th>45</th><th>buzzfeed[.]com</th><th>Unspecified</th></tr></tbody></table><p>&nbsp;</p><p>In two weeks, the Tyrell Corporation was in the news  one of the media sources was a less established media outlet, though the other was a very reputable source that had published a newspaper for nearly a century. While creating and publishing disinformation content with Raskalnikov was bumpy, in the end, the actor delivered, confirming the claim of being able to operate disinformation campaigns in Western countries.</p><p>However, of these two threat actors, Recorded Future analysts believe Doctor Zhivago to be the more experienced. This threat actor had been on the underground forums longer than Raskolnikov and had a well-established status. Based on discussions we had with Doctor Zhivago, we believe our primary contact was a Russian national and native Russian speaker, similar to Raskolnikov. In our communications, Doctor Zhivago was politely formal, as well as informative, even providing examples showing publications in some very reputable Russian-language media sources. Doctor Zhivago claimed to work with a team that included journalists, editors, translators, search engine optimization (SEO) specialists, and hackers. Doctor Zhivago maintained that this organization could spread disinformation accusing an individual or company of everything from business misconduct to criminal activity  whatever it took to permanently destroy a reputation.</p><p>Since the Tyrell Corporation now had a positive presence on the internet, it was time to see if it could be destroyed. We decided to use Doctor Zhivago to discredit our companys business practices, staying away from any criminal accusations that could theoretically have real-world implications. Doctor Zhivago estimated that our campaign would take a month or two to go into full effect because a successful disinformation operation happens in phases by gradually introducing an intentionally false narrative in an organic manner. The proof for our disinformation needed to come from real people, so Doctor Zhivago created them in the form of individual and group accounts on the same major social media platforms that Raskolnikov had used. </p><p>Since the Tyrell Corporation was both new and fictitious, there wasnt any publicly available information for Doctor Zhivago to manipulate. The group submitted a few articles for our review that accused the Tyrell Corporation of manipulating its employees by putting them in compromising situations. The articles stopped just short of accusing the company of criminal offenses, but anyone reading the articles would likely come to the conclusion that the Tyrell Corporation was not reputable and treated its employees as disposable objects. The content was written in much better English than what Raskolnikov had provided us, though there were a few awkward sentences that suggested this too wasnt the writing of a native English speaker. But like Raskolnikov, Doctor Zhivago was quick to correct these linguistic issues after we provided our feedback. With the articles published, it was now time to spread them throughout Doctor Zhivagos social media apparatus. </p><p>Doctor Zhivago had an organic, layered approach to propagating material throughout social media. First, a group of older accounts  referred to as aged accounts  that posted links to the articles they had published in media sources was employed. Then, a new batch of accounts that reposted content from the aforementioned aged accounts to amplify the messages was used. These new accounts befriended citizens living in the same country the Tyrell Corporation was located in to make the campaign more effective by targeting the audience. Doctor Zhivago explained to us that they usually create a few thousand social media accounts when engaging in these types of operations, as only a percentage of them would survive without being banned. Once the operation began, the articles went live on a number of media sites and were referenced throughout the social media platforms by accounts controlled by Doctor Zhivago.</p><p>Doctor Zhivagos list of media resources available for a U.K.-based disinformation campaign can be seen below. Doctor Zhivago broke up the media resources into categories they identified as low profile, medium profile, and top level.</p><table><tbody><tr><th>Low Profile</th><th>Medium Profile</th><th>Top Level</th></tr><tr><th>viennatimes[.]com  $600</th><th>aboutmanchester[.]co[.]uk  $1,340</th><th>reuters[.]com  $8,360</th></tr><tr><th>amiranews[.]com  $500</th><th>stories[.]swns[.]com  $1,340</th><th>dailypioneer[.]com  $6,350</th></tr><tr><th>dailyreleased[.]com  $500</th><th>abcmoney[.]co[.]uk  $1,340</th><th>econotimes[.]com  $6,685</th></tr><tr><th>xulnews[.]com  $500</th><th>calculator[.]co[.]uk  $1,340</th><th>mashable[.]com  $13,370</th></tr><tr><th>thesocialmagazine[.]com  $600</th><th>fortuneherald[.]com  $1,340</th><th>chamberofcommerce[.]com  $6,020</th></tr><tr><th>westernrelease[.]com  $600</th><th>newstoday[.]co[.]uk  $1,340</th><th>newsmax[.]com  $6,685</th></tr><tr><th>broowaha[.]com  $500</th><th> </th><th>techradar[.]com  $18,385</th></tr><tr><th>srjnews[.]com  $650</th><th> </th><th>techtimes[.]com  $4,010</th></tr><tr><th>lovebelfast[.]co[.]uk  $560</th><th> </th><th> </th></tr><tr><th>talk-business[.]co[.]uk  $600</th><th> </th><th> </th></tr><tr><th>15zjazd.whus[.]pl  $100</th><th> </th><th> </th></tr><tr><th>businessexponow[.]co[.]uk  $400</th><th> </th><th> </th></tr><tr><th>esrel2016[.]org  $400</th><th> </th><th> </th></tr><tr><th>internet-directory-web[.]com  $400</th><th> </th><th> </th></tr></tbody></table><p>&nbsp;</p><h3>Outlook</h3><p>From our research, Insikt Group discovered that launching a disinformation campaign is alarmingly simple and inexpensive. Recorded Future spent a total of $6,050 on both campaigns, with $1,850 going to the initial promotion by Raskolnikov, and $4,200 going to Doctor Zhivago for the negative disinformation to discredit our fictitious company.</p><p>Disinformation services are publically available on the underground criminal forums, and accessible to private sector clients  not only nation-states. These services are affordable and customizable. Their operators work in teams to publish articles on media websites and to propagate that material throughout social media accounts under their direct control.</p><p>They are willing to go to extreme lengths to accomplish their tasks, including filing false accusations with law enforcement against target entities. In the case of Doctor Zhivago, the threat actor offered to file a complaint against our fictitious company for involvement in human trafficking. And even though we used the Raskolnikov threat actor to promote Tyrell Corporation, Raskolnikov also offered a takedown service should we ever need to get even with another individual, set someone up at their place of work, destroy a competitors reputation, counter an opponents disinformation attack, or even sink an opponent in an election.</p><p>Today, the Tyrell Corporation lives on in social media and search engine results. Googling the domain name will present the unfavorable content created by Doctor Zhivago, though searching the company name directly will produce the positive articles and social media accounts created by Raskolnikov. If our experience is any indication, we predict that disinformation as a service will spread from a nationstate tool to one increasingly used by private individuals and entities, given how easy it is to implement.</p><h4>Footnotes</h4><div id="footnote"><p><sup>1</sup>Ion Mihai Pacepa and Ronald J. Rychlak (2013), Disinformation: Former Spy Chief Reveals Secret Strategies for Undermining Freedom, Attacking Religion, and Promoting Terrorism.</p><p><sup>2</sup> United States Department of State (1987), Soviet Influence Activities: A Report on Active Measures and Propaganda, 198687, Washington D.C.: Bureau of Public Affairs, pp. 3435, 39, 42.</p></div>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/2019_0912_The_Price_of_Influence_Disinformation_in_the_Private_Sector_1_d5fa283299.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Speaking via Omission: RT’s Primary Coverage in English and Russian]]></title>
            <link>https://www.recordedfuture.com/rt-coverage-analysis</link>
            <guid>https://www.recordedfuture.com/rt-coverage-analysis</guid>
            <pubDate>Thu, 29 Aug 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group® examined Recorded Future’s collection of references from the source RT in both English and Russian in order to assess what, if any, differences exist between the outlet’s reporting in the two languages. This analysis also examines what those differences may say about RT’s goals related to messaging and desired influence over the English and Russian information spaces.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_2_05bf0c8842.png" alt="insikt-group-logo-updated-2.png"></p><p><em><a href="https://go.recordedfuture.com/hubfs/reports/cta-2019-0829.pdf" rel="noopener noreferrer" target="_blank">Click here</a> to download the complete analysis as a PDF.</em></p><p><em>Insikt Group examined Recorded Futures collection of references from the source RT in both English and Russian in order to assess what, if any, differences exist between the outlets reporting in the two languages. This analysis also examines what those differences may say about RTs goals related to messaging and desired influence over the English and Russian information spaces.</p><p>This report will be most useful to organizations that engage with Russian-speaking populations or clients or seek to possess a fuller understanding of the goals and motivations of the Kremlin, for which state media is an important tool.</em></p><h3>Executive Summary</h3><p>RT is a news outlet <a href="https://archives.cjr.org/feature/what_is_russia_today.php" rel="noopener noreferrer" target="_blank">funded by the Russian government</a>. It is an important complement to Russias intelligence services. While RT obviously lacks the kinetic and cyber capabilities of those agencies, it is essential to conducting information warfare and <a href="https://www.americansecurityproject.org/wp-content/uploads/2017/10/Ref-0206-Russian-Social-Media-Information-Operations.pdf" rel="noopener noreferrer" target="_blank">priming the information space</a> for Russian influence. Although RTs English-language content has been well covered in the existing literature, little has been written about how this content compares to and interfaces with its Russian-language reporting. This report uses the Recorded Future Platform to analyze references from RT and construct an image of how it not only functions as an <a href="https://archive.org/stream/TheSwordAndTheShield-TheMitrokhinArchiveAndTheSecretHistoryOfTheKGB/The+Sword+and+the+Shield+-+The+Mitrokhin+Archive+and+the+Secret+History+of+the+KGB_djvu.txt" rel="noopener noreferrer" target="_blank">active measure</a> against the Western world, but also how it seeks to mold the Russian-speaking world.</p><p>Through this analysis, Insikt Group establishes with high confidence that RTs output can be generally described as geared toward <a href="https://www.eurozine.com/misunderstanding-russias-two-hybrid-wars/" rel="noopener noreferrer" target="_blank">sowing discord abroad</a> and establishing the Kremlins perspective as valid at home, a modus operandi that is in line with <a href="https://www.ecfr.eu/page/-/ECFR_169_-_INSIDE_RUSSIAS_INTELLIGENCE_SERVICES_(WEB_AND_PRINT)_2.pdf" rel="noopener noreferrer" target="_blank">that of Russias intelligence community</a>.</p><h3>Key Judgments</h3><ul><li>RT shows a strong regional bias in Russian, reporting on Russia in the native language far more than it reports on the U.S. or the U.K. in the English edition.</li><li>RTs English coverage has consistently attempted to focus on entities related to the 2016 U.S. presidential election up to two years after the election, most notably including then-candidate Hillary Rodham Clinton.</li><li>RT covers issues such as immigration and race relations for its English audience, but not for its Russian audience, and is likely to exploit controversies over these issues.</li><li>RT supplies far more information to Russian audiences on the conflict in Ukraine, bans on Russian athletes participation in the Olympics, and pro-secession narratives about regions such as Catalonia, likely in support of the Kremlins own ambitions.</li><li>RT shows a readiness to platform whistleblowers and increase the visibility of leaks when they are damaging to Western states, individuals, and organizations, but not if they concern alleged Russian misdeeds.</li><li>RT seeks to be an influential voice in the Russian language narrative surrounding Russian involvement in the Crimean annexation, the conflict in the Donbas, and in Ukrainian affairs writ large.</li><li>RT often seeks to reinforce its narrative in Ukraine by supporting analogous cases and stories in other parts of the world.</li></ul><h3>Background and Literature Review</h3><p>The phrase Russian disinformation has been in vogue among national security experts and, increasingly, regular citizens. While the term might evoke images of a shadowy conspiracy, distortion of the information space is often carried out by organizations operating in the open. RT is a <a href="https://www.kcl.ac.uk/policy-institute/assets/weaponising-news.pdf" rel="noopener noreferrer" target="_blank">well-used weapon</a> in the countrys <a href="https://www.nytimes.com/2017/09/13/magazine/rt-sputnik-and-russias-new-theory-of-war.html" rel="noopener noreferrer" target="_blank">hybrid warfare arsenal</a>. This report seeks to add an additional dimension to this: RTs Russian-speaking audience.</p><p>Existing literature notes that the pressure points exploited by the Kremlin in the course of informational or political warfare are not random; they all <a href="https://www.ecfr.eu/page/-/ECFR_169_-_INSIDE_RUSSIAS_INTELLIGENCE_SERVICES_(WEB_AND_PRINT)_2.pdf" rel="noopener noreferrer" target="_blank">ultimately serve to shore up the Russian state</a>. These studies have demonstrated that topics favored by the Kremlin are necessarily dual purpose. For example, polarizing coverage of police brutality in the U.S. obviously widens political divisions there, but in Russia, where those divisions are not as apparent, <a href="http://www.gmfus.org/publications/russian-narrative-proxies-western-balkans" rel="noopener noreferrer" target="_blank">it normalizes the states use of force</a>. Kremlin-linked media operating in Balkan and Baltic states notably <a href="http://www.gmfus.org/publications/russian-narrative-proxies-western-balkans" rel="noopener noreferrer" target="_blank">promote Euroscepticism</a> via <a href="https://warsawinstitute.org/russian-information-warfare-baltic-states-resources-aims/" rel="noopener noreferrer" target="_blank">consistently negative coverage</a> of the <a href="https://medium.com/dfrlab/balticbrief-sputnik-takes-aim-at-a-russian-speaking-audience-6f7668e6cc23" rel="noopener noreferrer" target="_blank">North Atlantic Treaty Organization</a> (NATO). The cycle is often self-reinforcing: negative portrayals of Western international organizations breed nationalist sentiment; the Kremlin publicly supports this sentiment; and, finally, domestic Russian nationalism is further legitimized. In sum, support for nationalism has been bolstered in both foreign and domestic arenas. Theoretically, this strategy would condition both arenas to be more tolerant of aggressive actions such as the Russian Federations annexation of Crimea in 2014, an act <a href="http://en.kremlin.ru/events/president/news/20366" rel="noopener noreferrer" target="_blank">justified using rhetoric</a> about the protection of Russian-speaking people.</p><p>What these analyses omit, however, is what role RT plays as a domestic news organization. A definitive judgment on the goals of the Kremlins disinformation campaign cannot be reached without comparing the narratives shown to English-speaking and Russian-speaking audiences; this report seeks to make inroads on providing that judgment. Additionally, although it is not a primary goal of this report, the success of the Kremlins information warfare in relation to its domestic audience will also be assessed.</p><h4>Project Scope and Methods</h4><p>Insikt Group analyzed Russian- and English-language content from RT published between January 2017 and July 2019. The data was divided by language, and will mostly be examined over the entire three-year period. Each languages data set consisted of a list of terms or entities as well as the number of times they were tagged in a reference over a set period of time.</p><p>These entities were cleaned, removing ones that were ambiguous to a degree that prevented their ready classification as well as ones that fell outside of the scope of this research. Some examples of entities that were removed include URLS, titles not connected to an individual (for example, President or ambassador), and other entities which did not clearly denote a subject of discussion (for example, World or via). Examples of entities that were removed because they fell outside of the research scope include news outlets likely cited as sources rather than discussed as entities themselves and international sports entities. Olympic and other international sports entities, such as FIFA, were kept because participation in them is analogous to representing ones country.</p><p>This data was then organized and processed further in one of two ways. In the first method, the top 100 entities were sorted into one of the following categories:</p><table><tbody><tr><th>United States</th><th>Russia</th><th>Regional/General</th><th>Issues</th><th>Removed/Miscellaneous Entities</th></tr><tr><td>U.S. (Geographically Defined)</td><td>Russia (Geographically Defined)</td><td>North America (Non-U.S.)</td><td>Ukraine</td><td>Non-Olympic Sports</td></tr><tr><td>U.S. Government</td><td>U.S. Government</td><td>Europe</td><td>Skripal Assassination</td><td>News Outlets as Sources</td></tr><tr><td>U.S. Intelligence Community</td><td>Russian Intelligence Community</td><td>Asia</td><td>Whistleblowers/Leaks</td><td>Not Subjects</td></tr><tr><td>Trump Family</td><td> </td><td>Africa</td><td>Cyber (Non-Election)</td><td> </td></tr><tr><td>U.S. Elections</td><td> </td><td>Central/Latin America</td><td>Terrorism</td><td> </td></tr><tr><td> </td><td> </td><td>International Organizations</td><td>Resources (e.g., Oil, Natural Gas)</td><td> </td></tr><tr><td> </td><td> </td><td> </td><td>Tech/Social Media</td><td> </td></tr><tr><td> </td><td> </td><td> </td><td>Ethnic Group</td><td> </td></tr></tbody></table>&nbsp;<p>These categories were usually ones that emerged during the cleaning and processing of the data. The appendix to this report elaborates on the types of entities that fell under each category or topic.</p><p>The second method of analysis involved collecting, for each year, the top 100 entities for each language, and examining how consistently they were discussed by RT in either language. To do this, Insikt Group calculated the number of times an entity was referenced by RT by month, from January 2017 to July 2019, and found the standard deviation of references by month for that entity, provided that the entity was in the top 100.</p><p>Entities that had appeared in fewer than 12 months over the entire period were removed from this second method of analysis, purging entities that did not develop past topics of passing interest in RTs coverage, regardless of their total reference count. Thus, it should be noted that this second analysis measures the consistency of frequently covered entities, rather than of all entities. The lower the standard deviation of a given entitys data set, the more consistently it appeared in RTs reporting.</p><h3>Threat Analysis</h3><p class="caption">Breakdown of the top categories for the full English data set (2017 to 2019).</p><p class="caption">Breakdown of the top categories for the full Russian data set (2017 to 2019).</p><p class="caption">Top 10 most consistent entities by number of monthly references in the English data set.</p><p>Comparing the data gathered from both the English and Russian language versions leads to several interesting takeaways.</p><h4>Regional Focus</h4><p>The first observation is that the English version of RT discusses the United States and United Kingdom significantly less than the Russian version discusses Russia. The English-speaking world, here defined as consisting of the U.S., U.K., and Canada, makes up 18.7% of the entities found in RTs English reporting. In the latter case, references to Russia make up 25.8% of the reporting over the period from 2017 to 2019.</p><p>Additionally, the Russian-language data shows that entities categorized as belonging to the Russian government or its intelligence community comprised 13.2% of the references, whereas entities belonging to the U.S. government and U.S. intelligence community make up just 3.1% of the content. While this finding can partly be explained by the idea that content in a given language tends to be about the region(s) in which that language is spoken, it does not account for the disparity in proportion of coverage.</p><h4>2016 U.S. Presidential Election and Russian Interference</h4><p class="caption">Coverage of entities related to the 2016 U.S. presidential election in the English data set.</p><p>The standard deviation data for the English-language content shows that entities related to the 2016 U.S. presidential election have been consistently reported on, even after the election. Among those entities are Russian hackers, COLLUSION, Democratic National Convention, and Hillary Rodham Clinton. It is unsurprising that RT would wish to have control over the narrative of an event that implicated Russias intelligence services in attempting to influence a U.S. election, but the appearance of 2016 presidential candidate Hillary Clintons name is telling. </p><p>The literature surrounding the Kremlins attempts to influence the election notes that <a href="https://www.justice.gov/file/1035477/download" rel="noopener noreferrer" target="_blank">Clinton was targeted almost exclusively negatively</a>. While the Donald John Trump entity does have a high volume of references, it appears that he is not as frequently discussed in the English-language data set as the aforementioned entities. Insikt Group assesses with high confidence that Clintons appearance as a consistently covered entity within a data set spanning over three years after the election likely points to a concerted effort to deflect attention from the investigation into Russian interference, especially as Clinton <a href="https://www.townandcountrymag.com/society/politics/news/a8629/heres-what-hillary-clinton-is-doing-today/" rel="noopener noreferrer" target="_blank">has not been a significant political figure since the end of 2016</a>.</p><h4>Secession</h4><p>An examination of the data through standard deviation (the second method of analysis) shows that Catalonia is one of the most consistently covered entities in the Russian-language data set. Catalonia is an autonomous community in Spain that notably held an independence referendum in 2017 wherein <a href="https://web.archive.org/web/20171006212613/http://www.govern.cat/pres_gov/govern/ca/monografics/303541/govern-trasllada-resultats-definitius-referendum-l1-doctubre-parlament-catalunya.html" rel="noopener noreferrer" target="_blank">92% of Catalonians voted to secede from Spain</a>.</p><p class="caption">Hits for Catalonia in the Russian data set by month.</p><p>Previous analysis of social media activity surrounding Catalonia shows that RT was a top influencer on the topic. The three accounts appearing as more influential than RT are linked to Edward Snowden, Julian Assange, and WikiLeaks, all of which <a href="https://medium.com/dfrlab/electionwatch-russia-and-referendums-in-catalonia-192743efcd76" rel="noopener noreferrer" target="_blank">have links to Russia</a> and appear to have had their posts on the issue amplified by bots. These entities reappear in the reference count analysis, suggesting that they serve to amplify more than one idea for RT.</p><p>While it is not clear why this topic would be covered more consistently in the Russian-language content than in the English alternative, one possibility is that it is to legitimate other separatist action, such as the separatist movement in Ukraines Donbas region or in the Crimean Peninsula, also in Ukraine. Insikt Group assesses with moderate confidence that this finding in the data set from Recorded Futures sourcing of RT likely confirms the news agencys bias in favor of pro-Russian separatism.</p><h4>Whistleblowers and Leaks</h4><p>The 2010s have been host to a number of significant leaks of sensitive documents, most all of which show up as well-covered entities in the English version of RT. Whistleblowers and leak-related entities such as Edward Snowden, William Binney, Julian Assange, Vault 7, and  WikiLeaks constituted 1.9% of the 2017 to 2019 results. RTs Russian-speaking audience, however, appears to be far less exposed to coverage of these entities, as just one related entity, Julian Assange, appears in the top 100 for any of the three surveyed years. When looking at the aggregated data over the full three-year period, this single whistleblower entity makes up just 0.1% of RTs 2017 to 2019 coverage in Russian.</p><p>In July 2019, a threat actor by the name of 0v1ru$ <a href="https://www.forbes.com/sites/zakdoffman/2019/07/20/russian-intelligence-has-been-hacked-with-social-media-and-tor-projects-exposed/#4cc0257a6b11" rel="noopener noreferrer" target="_blank">breached SyTech</a>, a contractor for the Federal Security Service (FSB), Russias national intelligence service, and gathered information on a number of FSB projects. These projects included efforts to scrape social media data, deanonymize Tor traffic, monitor and log email traffic from Russian companies, and split the Russian internet away from the rest of the world. Although these projects were <a href="https://www.forbes.com/sites/zakdoffman/2019/07/20/russian-intelligence-has-been-hacked-with-social-media-and-tor-projects-exposed/#4cc0257a6b11" rel="noopener noreferrer" target="_blank">known or expected</a>, the release of additional data on them is noteworthy because it increases their visibility, including their visibility to the Russian populace which they affect or target. To examine how RT might have responded to this leak, Insikt Group ran a query for references on RT which mentioned 0v1ru$, the threat actor responsible for this breach. The sole results from this search were three references from RTs German-language version.</p><p class="caption">Results from the query for 0v1ru$ on RT.</p><h4>Ukraine</h4><p class="caption">Breakdown of reporting on Ukrainian entities in the Russian-language version.</p><p>Ukraine has been in conflict with pro-Russian separatists located in the countrys Donbas region, which borders the Russian Federation, since 2014. In March of that year, the Crimean Peninsula was annexed by the Russian Federation. Since then, evidence of Russian support for the separatists in Ukraines east has surfaced. During this period, approval of the Kremlin  and especially of President Putin  rose significantly, with the latters approval <a href="https://www.levada.ru/en/ratings/" rel="noopener noreferrer" target="_blank">peaking at nearly 90% in 2015</a>, over a year after the Crimean annexation, <a href="https://www.levada.ru/en/ratings/" rel="noopener noreferrer" target="_blank">after sitting at 65% in January 2014</a>. Additionally, in response to the annexation, the European Council and the United States have issued <a href="https://www.consilium.europa.eu/en/press/press-releases/2019/06/20/illegal-annexation-of-crimea-and-sevastopol-eu-extends-sanctions-by-one-year/" rel="noopener noreferrer" target="_blank">economic sanctions targeting specific sectors of the Russian economy</a>, as well as <a href="https://www.treasury.gov/resource-center/sanctions/Programs/Documents/ukraine_eo.pdf" rel="noopener noreferrer" target="_blank">sanctions on individuals and entities</a> responsible for violating the sovereignty and territorial integrity of Ukraine.</p><p>As mentioned, Russian involvement in Ukraine has shown itself to have both a <a href="https://www.levada.ru/en/ratings/" rel="noopener noreferrer" target="_blank">powerful effect on the Russian populaces perception of the Kremlin</a> and a <a href="https://www.treasury.gov/resource-center/sanctions/Programs/Documents/ukraine_eo.pdf" rel="noopener noreferrer" target="_blank">negative economic and reputational one</a>. Coverage of Ukraine and related entities such as the <a href="https://www.bbc.com/news/world-europe-46352367" rel="noopener noreferrer" target="_blank">Kerch Strait</a>, Sevastopol, Crimea, and Ukrainian President Volodymyr Zelenskiy, constitutes the second-largest portion of RTs Russian-language content at 13.3%, compared to 1.6% of RTs English-language reporting. Notable, however, is Crimeas appearance as the 11th most consistently discussed entity in the English data set.</p><p>Accordingly, Insikt Group assesses with high confidence that it is likely that control over the narrative of Russias relationship with Ukraine, the Crimean annexation, and the conflict in the Donbas is a priority for RT. Insikt Group likewise concludes with high confidence that this is likely not a case of Ukrainian entities being overrepresented because of Ukraines proximity to Russia or <a href="https://www.unian.info/society/10481268-almost-half-of-ukrainians-speak-ukrainian-in-families-poll.html" rel="noopener noreferrer" target="_blank">because a considerable portion of the country speaks Russian</a>, seeing as Belarussian entities constitute just 0.7% of RTs Russian-language content over the same period, approximately 18 times less coverage than Ukrainian entities received despite Belarus <a href="http://kef.by/publications/research/opros-izuchenie-tsennostey-belorusskogo-obshchestva/?fbclid=IwAR0tYOqLTSjtEuUHF51tufmBlbU0dsHbBqFHTwR_AQet13d9XG84tX3_EHQ" rel="noopener noreferrer" target="_blank">also having a great number of Russian speakers</a> and <a href="https://foreignpolicy.com/2019/05/10/lukashenko-is-selling-belarus-piece-by-piece-to-russia/" rel="noopener noreferrer" target="_blank">close ties to Russia</a>.</p><h4>Ethnic and Religious Groups</h4><p>0.8% and 0.3% of RTs English-language reporting discusses Jewish and Muslim people, respectively. In the Russian version, the category does not apply to any of the top 100 entities for any of the three years surveyed. This is in part significant because <a href="https://www.themoscowtimes.com/2018/01/25/putin-calls-for-revival-of-islamic-education-in-russia-a60276" rel="noopener noreferrer" target="_blank">the Russian Federation is home to an estimated 20 million Muslims</a>, making RTs choice to cover that population in one language but not in another considerably suspect.</p><p>Extant literature discusses RTs proclivity for inflaming racial and ethnic conflict. A study from Kings College in London describes RT and Sputnik, another Kremlin-funded news agency, as highly specific aggregators of stories of immigrant crime and ethnic conflict across Europe. In an incident known as the Lisa case, RT infamously <a href="https://www.nato.int/docu/review/2016/Also-in-2016/lisa-case-germany-target-russian-disinformation/EN/index.htm" rel="noopener noreferrer" target="_blank">promoted a fake story about the murder of a German girl by migrants</a> and <a href="https://www.nytimes.com/2017/09/13/magazine/rt-sputnik-and-russias-new-theory-of-war.html" rel="noopener noreferrer" target="_blank">accused German authorities of covering up the matter</a> once the girl was found alive.</p><p>It should also be noted that this tendency to provide inflammatory content on issues of ethnicity and religion is aligned with the concerns of both the Russian and English audiences. In a <a href="https://www.levada.ru/2019/02/27/samye-ostrye-problemy-3/" rel="noopener noreferrer" target="_blank">poll conducted by the Russia-based Levada Analytical Center</a> in February of 2019, 14% of respondents in Russia stated they felt that the flow of migrants into Russia was the most pressing issue faced by the country. With regard to English-speaking countries, <a href="https://news.gallup.com/poll/1675/most-important-problem.aspx" rel="noopener noreferrer" target="_blank">a Gallup poll</a> conducted in January of 2019 showed that, when choosing among non-economic issues, 21% of Americans chose immigration as the most important problem facing the country today. Additionally, <a href="https://www.ipsos.com/ipsos-mori/en-uk/ipsos-mori-issues-index-january-2019-worry-about-brexit-and-eu-has-fallen-however-remains-britains" rel="noopener noreferrer" target="_blank">a poll conducted in the same month by U.K. pollster Ipsos MORI</a> found that 19% of the British public believes immigration to be the most pressing issue facing the country. Although the perception of the threat of immigration appears moderately higher in the English-speaking world, this does not account for the relative absence of reporting on issues of race and ethnicity in RTs Russian-language content.</p><p>The high incidence of entities such as Jewish and Jew is possibly a reflection of long-standing accusations by the Kremlin and associated news organizations, including RT, <a href="https://foreignpolicy.com/2019/08/02/russian-disinformation-distorted-reality-in-ukraine-americans-should-take-note-putin-mueller-elections-antisemitism/" rel="noopener noreferrer" target="_blank">that the government in Ukraine is anti-Semitic</a>. A more likely cause is that these terms often appear in reporting on Israel. RTs reporting on Israeli entities constitutes 2.2% of its English-language content, compared to 1.6% for Ukrainian entities in the same.  </p><p>Given existing proof of RTs intent to mislead in covering stories related to ethnic and religious tensions, immigration, and similar issues, Insikt Group assesses with high confidence that RTs lack of reporting on these issues in Russian is likely intended to preserve social stability, whereas its decision to cover these issues in English is intended to provoke and widen divisions in those societies.</p><h3>Outlook</h3><p>As this report shows, monitoring the activity of Kremlin-associated media such as RT in several languages, provided that it is available, can provide valuable insight into the Kremlins goals for both the foreign and domestic information environments. Moreover, examining the differences between reporting in several languages, as Insikt Group has done here, is another valuable method of ascertaining the goals of a news organization, and arguably provides greater depth of knowledge than would be possible with the examination of a single language, as much of the extant literature has done.</p><p>The examination of both English and Russian here is also important from a geopolitical perspective. Changing the behavior of an aggressive state such as Russia requires both an in-depth understanding of the disinformation employed by that state abroad for the purposes of destabilization as well as of disinformation employed at home for the purposes of maintaining power and restricting access to the truth. To this end, it would be beneficial to conduct a multilingual examination of other well-known Kremlin media associates, such as Sputnik International. This understanding may serve to inform preventative measures against disinformation and so-called fake news. It may also provide Western media with the tools necessary to fight disinformation in Russia and in regions neighboring it, namely the Baltics, Belarus, and Ukraine.</p><p><em><strong>Editors Note</strong>: This report was written by a member of our summer internship program.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/rt_coverage_analysis_3a6d51a568.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Iranian Threat Actor Amasses Large Cyber Operations Infrastructure Network to Target Saudi Organizations]]></title>
            <link>https://www.recordedfuture.com/iranian-cyber-operations-infrastructure</link>
            <guid>https://www.recordedfuture.com/iranian-cyber-operations-infrastructure</guid>
            <pubDate>Wed, 26 Jun 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group® researchers used proprietary methods, including Recorded Future Network Traffic Analysis and Recorded Future Domain Analysis, along with common analytical techniques, to profile Iranian cyberespionage threat actor APT33 (Elfin) and determine whether the public exposure of their TTPs in March 2019 impacted their operations.]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/Primary_Logo_Insikt_Digital_RGB_45f99b2dc9.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p><em><a href="https://go.recordedfuture.com/hubfs/reports/cta-2019-0626.pdf"  rel="noopener noreferrer">Click here</a> to download the complete analysis as a PDF.</em></p><p>_Insikt Group researchers used proprietary methods, including Recorded Future Network Traffic Analysis and Recorded Future Domain Analysis, along with common analytical techniques, to profile Iranian cyberespionage threat actor APT33 (Elfin) and determine whether the public exposure of their TTPs in March 2019 impacted their operations.</p><p>Data sources include the Recorded Future Platform, Farsight Securitys DNSDB, ReversingLabs, VirusTotal, Shodan, and common OSINT techniques.</p><p>This report will be of greatest interest to those interested in Middle Eastern geopolitics, as well as network defenders of organizations with a presence in the Middle East or in industries targeted by APT33, such as aerospace and defense, energy, finance, telecommunications, and manufacturing.</p><p>This research is based on data collected between February 10, 2019 and June 6, 2019._</p><h3 id="executive-summary">Executive Summary</h3><p>The United States and Iran continue to escalate tensions, most recently <a href="https://www.wsj.com/articles/trump-says-iran-attack-scrapped-to-avoid-unnecessary-casualties-11561226052"  rel="noopener noreferrer">accelerating rhetoric</a> and <a href="https://www.wsj.com/video/how-the-iranian-attack-on-a-us-drone-impacts-relations/7F26B246-B2CF-4EFF-8616-76F5508BA790.html"  rel="noopener noreferrer">actions</a> in the Strait of Hormuz, but also in the cyber domain. Over the past three months, Recorded Futures Insikt Group has observed an increase in APT33s (also known as Elfin) infrastructure building and targeting activity, and on June 21, 2019, <a href="https://news.yahoo.com/pentagon-secretly-struck-back-against-iranian-cyber-spies-targeting-us-ships-234520824.html"  rel="noopener noreferrer">Yahoo! News reported</a> that the U.S. Cyber Command launched cyberattacks on an Iranian spy group.</p><p>Iranian state-sponsored threat actor APT33 has been conducting cyberespionage activity since <a href="https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html"  rel="noopener noreferrer">at least 2013</a>, predominantly targeting nations in the Middle East, but also notably targeting U.S., South Korean, and European commercial entities across a wide variety of sectors.</p><p>Insikt Group researchers used proprietary methods, including Recorded Future Domain Analysis and Recorded Future Network Traffic Analysis, along with other common analytical approaches, to profile <a href="https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage"  rel="noopener noreferrer">recently reported</a> Iranian threat actor APT33s domain and hosting infrastructure in an effort to identify recent activity and better understand the groups tactics, techniques, and procedures (TTPs).</p><p>Our research found that APT33, or a closely aligned threat actor, continues to conduct and prepare for widespread cyberespionage activity, with over 1,200 domains used since March 28, 2019 and with a strong emphasis on using commodity malware. Commodity malware is an attractive option for nation-state threat actors who wish to conduct computer network operations at scale and hide in plain sight among the noise of other threat actor activities, thus hindering attribution efforts.</p><p>The <a href="https://www.scmagazineuk.com/industry-saudi-arabia-us-targeted-apt33-elfin/article/1580402"  rel="noopener noreferrer">targeting</a> of mainly Saudi Arabian organizations across a wide variety of industries aligns with historical targeting patterns for the group, which appear undeterred following previous exposs of their activity. Western and Saudi  both public and private sector  organizations in industries that have been historically targeted by APT33 should be monitoring geopolitical developments and increasing the scrutiny of operational security controls focusing on detection and remediation of initial unauthorized access, specifically from phishing campaigns, webshells, and third-party (vendor and supplier) relationships. Additionally, real-time security intelligence should be used to improve hunting in internal network and host-based telemetry.</p><h3 id="key-judgments">Key Judgments</h3><ul><li><p>In response to the <a href="https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage"  rel="noopener noreferrer">publication</a> of operations in late March 2019, domains associated with suspected APT33 activity were parked or changed to new hosting providers.</p></li><li><p>APT33, or a closely aligned threat actor, continues to control C2 domains in bulk.</p><ul><li>Over 1,200 domains have been in use since March 28, 2019 alone.</li><li>728 of these were identified communicating with infected hosts.</li><li>575 of the 728 domains were observed communicating with hosts infected by one of 19 mostly publicly available RATs.</li></ul></li><li><p>Almost 60% of the suspected APT33 domains that were classified to malware families related to njRAT infections, a RAT not previously associated with APT33 activity. Other commodity RAT malware families, such as AdwindRAT and RevengeRAT, were also linked to suspected APT33 domain activity.</p></li><li><p>We assess with medium confidence that APT33, or a closely aligned threat actor, has targeted the following organizations since the disclosures in late March:</p><ul><li>A conglomerate headquartered in Saudi Arabia, with businesses in the engineering and construction, utilities, technology, retail, aviation, and finance sectors</li><li>Two Saudi healthcare organizations</li><li>A Saudi company in the metals industry</li><li>An Indian mass media company</li><li>A delegation from a diplomatic institution</li></ul></li><li><p>We assess that the recent reporting on links between the Nasr Institute and Kavosh Security Group, as well as technical and persona analysis, overlaps among APT33, APT35, and MUDDYWATER, and is probably a result of the tiered structure that Iran utilizes to manage cyber operations.</p></li></ul><h3 id="background">Background</h3><p>APT33 is an Iranian state-sponsored threat actor that has engaged in cyberespionage activities since at least 2013. They have typically used <a href="https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html"  rel="noopener noreferrer">commodity</a> <a href="https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage"  rel="noopener noreferrer">malware</a> and possess an <a href="https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage"  rel="noopener noreferrer">expansive network infrastructure</a> that enables them to scale their operations for victim targeting. Historically, this targeting has focused on the aerospace and defense industries, as well as the oil and gas industry, with a strong focus on companies based in Saudi Arabia. <a href="https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage"  rel="noopener noreferrer">Symantecs Elfin report</a> denoted additional targeting of the engineering, chemical, research, finance, IT, and healthcare sectors. Recorded Futures Insikt Group has been monitoring APT33 activity, beginning with research published in October 2017, which revealed new infrastructure, malware hashes, and TTPs relating to the threat actor(s).</p><h3 id="threat-analysis">Threat Analysis</h3><p>On March 27, 2019, Symantec published research titled, <a href="https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage"  rel="noopener noreferrer">Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.</a> The report outlined a three- year APT33 cyberespionage campaign. Using the IP addresses and malware hashes provided in that research, Insikt Group researchers conducted a follow-up analysis of the malicious domains used by APT33 to determine two things:</p><ol><li>Whether or not APT33 had continued their activities, and if so, if they had changed TTPs in response to the publication</li><li>Whether or not there were any previously unreported historic activities conducted by the group that were worthy of publication</li></ol><h4 id="nasr-institute-and-kavosh-redux">Nasr Institute and Kavosh Redux</h4><p>In our previous report, <a href="https://www.recordedfuture.com/iran-hacker-hierarchy/">Irans Hacker Hierarchy Exposed</a>, we concluded that the exposure of one APT33 contractor, the Nasr Institute, by FireEye in 2017, along with our intelligence on the composition and motivations of the Iranian hacker community, pointed to a tiered structure within Irans state-sponsored offensive cyber program. We assessed that many Iranian state-sponsored operations were directed by the Iranian Revolutionary Guard Corps (IRGC) or the Ministry of Intelligence and Security (MOIS).</p><p>According to a sensitive Insikt Group source who provided information for previous research, these organizations employed a mid-level tier of ideologically aligned task managers responsible for the compartmentalized tasking of over 50 contracting organizations, who conducted activities such as vulnerability research, exploit development, reconnaissance, and the conducting of network intrusions or attacks. Each of these discrete components, in developing an offensive cyber capability, were purposefully assigned to different contracting groups to protect the integrity of overarching operations and to ensure the IRGC and/or MOIS retained control of operations and mitigated the risk from rogue hackers.</p><p><img src="https://cms.recordedfuture.com/uploads/iranian_cyber_operations_infrastructure_1_2_6caffc3045.png" alt="iranian-cyber-operations-infrastructure-1-2.png"></p><p>Obfuscating Iranian government involvement in offensive campaigns.</p><p>FireEye also noted in their 2017 report that the online handle xman_1365_x, found within the PDB path in an APT33 TURNEDUP backdoor sample, belonged to an individual at the Nasr Institute. The same handle was then linked to destructive operations using NewsBeef and StoneDrill malware families. Then, in March 2017, <a href="http://securityaffairs.co/wordpress/56929/cyber-crime/stonedrill-wiper-shamoon.html"  rel="noopener noreferrer">researchers linked</a> StoneDrill to the Shamoon 2 operation and to the APT35 (also known as Charming Kitten, Newscaster, or NewBeef) threat actor.</p><p>Our <a href="https://www.recordedfuture.com/iran-hacker-hierarchy/">previous analyses</a> showed that the person behind the xman_1365_x handle self-identified on Iranian hacking forums as Mahdi Honarvar from Mashhad, with speculation that he was also affiliated with the Kavosh Security Center since around 2017.</p><p>Kavoshs role within the Iranian cyber ecosystem was further uncovered by Group-IBs <a href="https://www.group-ib.ru/blog/muddywater"  rel="noopener noreferrer">recent analysis</a> detailing that Kavosh was the employer for Nima Nikjoo between 2006 and 2014. Their analysis concluded that a March 2019 campaign targeting a Turkish military electronics manufacturer was perpetrated by another Iranian threat actor, MUDDYWATER. MUDDYWATER used the POWERSTATS backdoor, proliferated in maldocs that contained metadata revealing the author as Gladiyator_CRK, with a possible name of Nima. Additionally, an email address suspected to be related, <a href="mailto:&#x67;&#108;&#97;&#100;&#x69;&#121;&#97;&#116;&#111;&#114;&#x5f;&#99;&#x72;&#97;&#x63;&#x6b;&#x65;&#x72;&#64;&#121;&#x61;&#x68;&#x6f;&#x6f;&#46;&#x63;&#111;&#x6d;">&#x67;&#108;&#97;&#100;&#x69;&#121;&#97;&#116;&#111;&#114;&#x5f;&#99;&#x72;&#97;&#x63;&#x6b;&#x65;&#x72;&#64;&#121;&#x61;&#x68;&#x6f;&#x6f;&#46;&#x63;&#111;&#x6d;</a>, was associated with  , which translates to Nima Nickjou, in a 2014 blog that exposed the names and email addresses of individuals allegedly employed at the Nasr Institute. Another research blog authored by pseudonym 0xffff0800 corroborated some of these findings and revealed  Nima Nikjoo to be Nima Nikjoo Tabrizi.</p><p><img src="https://cms.recordedfuture.com/uploads/iranian_cyber_operations_infrastructure_2_1_c95a298537.png" alt="iranian-cyber-operations-infrastructure-2-1.png"></p><p>LinkedIn profile picture of suspected APT33 threat actor Nima Nikjoo Tabrizi. (Accessed on June 14, 2019)</p><h4 id="who-is-nima-nikjoo-tabrizi">Who Is Nima Nikjoo Tabrizi?</h4><p>OSINT reveals there is an active Linkedin account and other active social media accounts in the name of Nima Nikjoo Tabrizi, claiming that he is a reverse engineer and malware analyst at Symantec. Symantec, however, has confirmed to Recorded Future that Tabrizi has never worked for them:</p><p>&quot;We have been aware of this individual for a long time. Nima Nikjoo is not a Symantec employee and we have no record of an individual by this name working at Symantec.&quot;</p><p>Having been exposed working for the Nasr Institute, a government organization, and the <a href="https://www.group-ib.ru/blog/muddywater"  rel="noopener noreferrer">Kavosh Security Center</a>, which has strong associations with Iranian state-sponsored cyberespionage activity, we assess with high confidence that Tabrizi is engaged in cyberespionage activity on behalf of the Iranian state.</p><p><img src="https://cms.recordedfuture.com/uploads/iranian_cyber_operations_infrastructure_3_1_6c27bbcf62.png" alt="iranian-cyber-operations-infrastructure-3-1.png"></p><p>Employment history of suspected APT33 threat actor Nima Nikjoo Tabrizi.</p><p>Based on this information, it is possible that upon the exposure of the Nasr Institute as a front for Iranian state-sponsored offensive cyber activity, employees transitioned over to other entities, such as Kavosh, to protect their identities and minimize further exposure. There were no further widely reported exposures relating to the Nasr Institute until the links between Mahdi Honarvar to Kavosh Security Center were revealed in 2017. Therefore, we assess that the overlapping technical and personal information points to a historic linkage between the threat actors APT33, APT35, and MUDDYWATER.</p><p>These technical and persona overlaps among Iranian threat actors are not unexpected given the tiered structure of Iranian state management of cyber operations. Within this structure, we assessed that managers are running multiple teams, some of which are associated with government organizations and others that are contracted private companies (such as <a href="https://www.justice.gov/opa/file/834996/download"  rel="noopener noreferrer">ITSec Team</a>).</p><h3 id="technical-analysis">Technical Analysis</h3><h4 id="apt33-cleaning-up">APT33 Cleaning Up?</h4><p>Starting with the APT33 indicators documented by Symantec, Insikt Group profiled the domain and hosting infrastructure used by the group using the Farsight Security extension within the Recorded Future platform, revealing updated IP resolutions for some of the domains.</p><table>  <tr>    <th>Domain</th>    <th>Original IP Resolution (Per Symantec Report)</th>     <th>Updated IP Resolutions</th>  </tr>  <tr>    <td>backupnet.ddns[.]net</td>    <td>25.187.21[.]71, 91.230.121[.]143</td>     <td>95.183.54[.]119</td>  </tr>  <tr>    <td>hyperservice.ddns[.]net</td>    <td>8.26.21[.]119</td>     <td>95.183.54[.]119</td>  </tr>  <tr>    <td>microsoftupdated[.]com</td>    <td>5.187.21[.]70</td>     <td>52.45.178[.]122</td>  </tr>  <tr>    <td>mynetwork[.]cf</td>    <td>192.119.15[.]41, 195.20.52[.]172</td>     <td>195.20.52[.]172</td>  </tr>  <tr>    <td>mypsh.ddns[.]net</td>    <td>162.250.145[.]204, 162.250.145[.]234, 192.119.15[.]35, 192.119.15[.]37, 64.251.19[.]214, 64.251.19[.]231, 64.251.19[.]232, 8.26.21[.]120, 8.26.21[.]221, 8.26.21[.]222</td>     <td>No Current Resolution</td>  </tr>  <tr>    <td>mypsh.ddns[.]net</td>    <td>5.79.127[.]177</td>     <td>0.0.0[.]0</td>  </tr>  <tr>    <td>mywinnetwork.ddns[.]net</td>    <td>91.235.142[.]76, 91.235.142[.]124, 89.34.237[.]118</td>     <td>0.0.0[.]0</td>  </tr>  <tr>    <td>remote-server.ddns[.]net</td>    <td>192.119.15[.]39, 91.230.121[.]143</td>     <td>0.0.0[.]0</td>  </tr>  <tr>    <td>remserver.ddns[.]net</td>    <td>217.147.168[.]44, 91.230.121[.]144</td>     <td>0.0.0[.]0</td>  </tr>  <tr>    <td>securityupdated[.]com</td>    <td>217.13.103[.]46</td>     <td>204.11.56[.]48</td>  </tr>  <tr>    <td>servhost.hopto[.]org</td>    <td>37.48.105[.]178</td>     <td>95.183.54[.]119, 0.0.0[.]0</td>  </tr>  <tr>    <td>service-avant[.]com</td>    <td>213.252.244[.]14</td>     <td>213.252.244[.]144, 51.77.102[.]108</td>  </tr>  <tr>    <td>srvhost.servehttp[.]com</td>    <td>8.26.21[.]117, 64.251.19[.]216</td>     <td>95.183.54[.]119</td>  </tr>  <tr>    <td>svcexplores[.]com</td>    <td>8188.165.4[.]81</td>     <td>-</td>  </tr>  <tr>    <td>update-sec[.]com</td>    <td>95.211.191[.]117</td>     <td>-</td>  </tr>   </table><p>As expected, many of the domains exposed in the original Symantec report have been parked or no longer resolve to a real IPv4 address. Interestingly, four of the original domains (backupnet.ddns[.]net, hyperservice.ddns[.]net, servhost.hopto[.]org, and srvhost.servehttp[.]com) were all updated the day after publication, and resolve to the same IP, 95.183.54[.]119. This IP is registered to Swiss-dedicated hosting provider Solar Communications GmBH. It is unclear as to why these domains were not likewise parked. Possible reasons include:</p><ul><li>The domains were deemed high value by the threat actor, and therefore retained for continued operational purposes.</li><li>The operators had difficulty with or could not update the domains for administrative reasons.</li></ul><p><img src="https://cms.recordedfuture.com/uploads/iranian_cyber_operations_infrastructure_4_1_cc4fc8660c.png" alt="iranian-cyber-operations-infrastructure-4-1.png"></p><p>Recorded Future Intelligence Card for microsoftupdated[.]com, enriched using the Farsight Security extension.</p><p>In order to identify additional related and potentially malicious infrastructure, we pivoted on the Swiss IP 95.183.54[.]119 and identified approximately 40 domains that were newly resolving to the IP since mid-February 2019. We positively identified RAT malware communication from a selection of domains.</p><table>  <tr>    <th>Domain</th>    <th>IP</th>     <th>Malware Observed Communicating With Domain</th>  </tr>  <tr>    <td>windowsx.sytes[.]net</td>    <td>95.183.54[.]119</td>     <td>Nanocore</td>  </tr>  <tr>    <td>hellocookies.ddns[.]net</td>    <td>95.183.54[.]119</td>     <td>Nanocore, QuasarRAT variant</td>  </tr>  <tr>    <td>njrat12.ddns[.]net</td>    <td>95.183.54[.]119</td>     <td>njRAT</td>  </tr>  <tr>    <td>trojan1117.hopto[.]org</td>    <td>95.183.54[.]119</td>     <td>njRAT</td>  </tr>  <tr>    <td>wwwgooglecom.sytes[.]net</td>    <td>95.183.54[.]119</td>     <td>njRAT</td>  </tr>  <tr>    <td>newhost.hopto[.]org</td>    <td>95.183.54[.]119</td>     <td>njRAT, DarkComet</td>  </tr>  <tr>    <td>za158155.ddns[.]net</td>    <td>95.183.54[.]119</td>     <td>njRAT</td>  </tr></table><p>Additionally, many of the domains that resolved to the Swiss IP were registered with hostnames that reflected the names of commodity RATs, such as XTreme RAT, xtreme.hopto[.]org, and njRAT ( njrat12.ddns[.]net), as well as popular tools like Netcat (n3tc4t.hopto[.]com). Interestingly, a domain spoofing a popular Farsi-language Telegram channel called <a href="https://t.me/BistBots"  rel="noopener noreferrer">BistBots</a> (bistbotsproxies.ddns[.]net) was also co-hosted on the same IP. We assess that this likely indicates a desire to target users of BistBots who seek up-to-date, high-speed internet proxies, possibly to circumvent network filtering and <a href="https://www.middleeasteye.net/news/when-you-create-filters-they-create-proxies-iranian-web-users-get-past-filters"  rel="noopener noreferrer">access sites such as Facebook, Twitter, and YouTube</a>, which are restricted in Iran.</p><p>Further analysis of the domains above, including windowsx.sytes[.]net, njrat12.ddns[.]net, and wwwgooglecom.sytes[.]net shows that they have been classified as C2s for Nanocore and njRAT, according to their respective Recorded Future Intelligence Cards. The information detailed are correlations derived from hash reports from malware multiscanner repositories and malware detonations that contain direct references to the domains.</p><p>Interestingly, while the Symantec research noted APT33s use of Nanocore, njRAT was not mentioned, which indicates a previously unknown addition to the groups ever-expanding repertoire of commodity malware.</p><p><img src="https://cms.recordedfuture.com/uploads/iranian_cyber_operations_infrastructure_5_1_5e4e27ea3b.png" alt="iranian-cyber-operations-infrastructure-5-1.png"></p><p>Context panel from the Recorded Future Intelligence Card for windowsx.sytes[.]net, showing the relationship between the domain and the Nanocore RAT malware.</p><p>The Maltego chart below shows the link analysis of selected domains hosted on the Swiss IP, with derived hashes associated with malware family name.</p><p><img src="https://cms.recordedfuture.com/uploads/iranian_cyber_operations_infrastructure_6_1_7b833fca94.png" alt="iranian-cyber-operations-infrastructure-6-1.png"></p><p>Maltego graph of domains hosted on the known malicious APT33-linked IP.</p><h4 id="deeper-infrastructure-correlations">Deeper Infrastructure Correlations</h4><p>Insikt Group enumerated all domains reported as being used by APT33 since January 2019. We pivoted through common infrastructure hosting patterns using passive DNS and similar approaches to identify additional suspected APT33 infrastructure. </p><p>A preliminary analysis identified 1,252 unique, correlated domains likely administered by the same APT33 attackers behind the campaign documented by Symantec. Of these, 728 domains were identified as communicating with files on infected hosts, with 575 of these positively correlated to a RAT malware family. The remaining 153 domains were identified as malicious based on AV engine hits but could not be conclusively classified to a specific malware family automatically.</p><p><em><strong>Editors Note</strong>: A selection of the domains, hashes, and associated IP address infrastructure connected to suspected APT33 domains will soon be made available to Recorded Future clients in a specialized Certified Data Set called Weaponized Domains, enabling companies to regulate the interaction with malicious free/anonymous infrastructure, including dynamic DNS (DDNS) domains.</em></p><p><img src="https://cms.recordedfuture.com/uploads/iranian_cyber_operations_infrastructure_7_1_17a7573648.png" alt="iranian-cyber-operations-infrastructure-7-1.png"></p><p>Pie chart of suspected APT33 malware use.</p><p>A top-level activity breakdown of these suspected APT33 domains and their linked malware families since March 28, 2019 reveals that 60% of the domains use the njRAT malware, with a wide selection of other commodity tools being used. In total, 1,804 unique malware hashes were analyzed to classify them into the 19 malware families, listed below.</p><table>  <tr>    <th>Malware Family</th>    <th>Percentage (%)</th>   </tr>  <tr>    <td>NJRat</td>    <td>59.99</td>   </tr>  <tr>    <td>unknown</td>    <td>25.35</td>   </tr>  <tr>    <td>RevengeRAT</td>    <td>4.40</td>   </tr>  <tr>    <td>NanoCoreRAT</td>    <td>3.96</td>   </tr>  <tr>    <td>DarkComet</td>    <td>1.74</td>   </tr>  <tr>    <td>SpyNet</td>    <td>0.87</td>   </tr>  <tr>    <td>RemcosRAT</td>    <td>0.76</td>   </tr>  <tr>    <td>XtremeRAT</td>    <td>0.60</td>   </tr>  <tr>    <td>ImminentMonitor</td>    <td>0.43</td>   </tr>  <tr>    <td>NetWireRAT</td>    <td>0.33</td>   </tr>  <tr>    <td>Orcus</td>    <td>0.33</td>   </tr>  <tr>    <td>QuasarRAT</td>    <td>0.27</td>   </tr>  <tr>    <td>888RAT</td>    <td>0.22</td>   </tr>  <tr>    <td>qRat</td>    <td>0.22</td>   </tr>  <tr>    <td>Adwind</td>    <td>0.16</td>   </tr>  <tr>    <td>SandroRAT</td>    <td>0.11</td>   </tr>  <tr>    <td>PlasmaRAT</td>    <td>0.11</td>   </tr>  <tr>    <td>AsyncRAT</td>    <td>0.05</td>   </tr>  <tr>    <td>BitterRat</td>    <td>0.05</td>   </tr>  <tr>    <td>StoneDrill</td>    <td>0.05</td>   </tr></table><p>From the table and the accompanying chart, we noted that APT33, or a closely aligned threat actor, have been prolific in their continued use of commodity malware and publicly available tooling, and have added several malware families previously unreported to be associated with the threat actor, including njRAT, RevengeRAT, and AdwindRAT. A significant proportion of the samples (25%), while deemed malicious, contained generic code that could not be definitively classified at a high enough degree of confidence to warrant further manual static analysis. We will continue to focus closely on these samples in subsequent analyses.</p><p>Many of the domains uncovered spoofed global technology providers such as Microsoft and Google, as well as business-oriented, web-based services such as video conferencing provider Zoom. Geopolitically themed domains were also present in this list of suspected APT33 infrastructure, such as vichtorio-israeli.zapto[.]org (Victory to Israel),  fucksaudi.ddns[.]com and palestine.loginto[.]me. The choice of hostnames may offer insight into the targeting pattern of APT33 operations against the Islamic Republic of Irans perceived enemies  notably, Israel, Saudi Arabia, and the wider <a href="https://en.wikipedia.org/wiki/Gulf_Cooperation_Council"  rel="noopener noreferrer">Gulf Cooperation Council</a> (GCC) nations.</p><table>  <tr>    <th>Domain</th>    <th>Malware Family</th>     <th>SHA256</th>  </tr>  <tr>    <td>fucksaudi.ddns[.]net</td>    <td>RevengeRAT</td>     <td>d8e60135aecb3a2a7422c06cfb94ed9aaf1182145d1c482f84b0bd81aa5d2416</td>  </tr>  <tr>    <td>googlechromehost.ddns[.]net</td>    <td>NanoCoreRAT</td>     <td>e2cfc91085b9b5db41c4c4297c594758dd9a0c8561ce4544da9faedd3a6b91e8</td>  </tr>  <tr>    <td>backupnet.ddns[.]net</td>    <td>StoneDrill</td>     <td>a217eb149b65552e3127c65c306aa521dca54959ceee89e85dd2e6e38c0d8f8b</td>  </tr>  <tr>    <td>younesadams.ddns[.]net</td>    <td>SandroRAT</td>     <td>410b5f374059cc21b2c738a71957c97e4183d92580d1d48df887deece6d2f663</td>  </tr>  <tr>    <td>teamnj.ddns[.]net</td>    <td>DarkComet</td>     <td>e144db21cc5f8f57aa748c0a8e4008fc34f8dd831eb2442eb35961e4cdf41f22</td>  </tr></table><br>Selection of hashes correlated with suspected APT33 malicious domains. Recorded Future clients will be able to access the full list of domains in the Certified Data Set via API download.<h4 id="targeted-organizations">Targeted Organizations</h4><p>Using data from Recorded Future Domain Analysis and combining it with data derived from Recorded Future Network Traffic Analysis, Insikt Group researchers were able to identify a small selection of likely targeted organizations impacted by suspected APT33 activity.</p><table>  <tr>    <th>Targeted Organization</th>    <th>Sector(s)</th>     <th>Country of Operation</th>    <th>Date of Observed Activity</th>    <th>Suspected APT33 C2 IP</th>  </tr>  <tr>    <td>Organization 1</td>    <td>Engineering and Construction, Water and Electricity, Technology, Retail, Finance</td>     <td>Saudi Arabia, UAE, Egypt, Turkey, Croatia</td>    <td>May 2  June 3, 2019</td>    <td>134.3.20[.]151</td>  </tr>  <tr>    <td>Organization 2</td>    <td>Mass Media</td>     <td>India</td>    <td>May 4  June 1, 2019</td>    <td>134.3.20[.]151</td>  </tr>  <tr>    <td>Organization 3</td>    <td>Diplomatic</td>     <td>Burkina Faso</td>    <td>May 2, 2019</td>    <td>134.3.20[.]151</td>  </tr>  <tr>    <td>Organizations 4 and 5</td>    <td>Healthcare</td>     <td>Saudi Arabia</td>    <td>May 2  May 8, 2019</td>    <td>41.103.3[.]7, 46.249.47[.]193</td>  </tr>  <tr>    <td>Organization 6</td>    <td>Industrial</td>     <td>Saudi Arabia</td>    <td>May 25  June 3, 2019</td>    <td>62.113.171[.]186</td>  </tr></table><h3 id="outlook">Outlook</h3><p>Following the exposure of a wide range of their infrastructure and operations by Symantec earlier this year, we discovered that APT33, or closely aligned actors, reacted by either parking or reassigning some of their domain infrastructure. The fact that this activity was executed just a day or so after the report went live suggests the Iranian threat actors are acutely aware of the media coverage of their activities and are resourceful enough to be able to react in a quick manner.</p><p>Since late March, suspected APT33 threat actors have continued to use a large swath of operational infrastructure, well in excess of 1,200 domains, with many observed communicating with 19 different commodity RAT implants. An interesting development appears to be their increased preference for njRAT, with over half of the observed suspected APT33 infrastructure being linked to njRAT deployment.</p><p>While we havent observed a widespread targeting of commercial entities or regional adversaries like in previously documented APT33 operations, the handful of targeted organizations that we did observe were mainly located in Saudi Arabia across a range of industries, indicating ongoing targeting aligned with geopolitical aims. We assess that the large amount of infrastructure uncovered in our research is likely indicative of wider ongoing operational activity, or the laying of groundwork for future cyberespionage operations. We recommend organizations take measures to monitor their networks for evidence of suspected APT33 activity by following the guidance in the Network Defense Recommendations section below.</p><p>Finally, our recommendation to Recorded Future clients is to use our upcoming Weaponized Domains Certified Data Set, which has been derived from predictive analytics that assist in the identification of malicious APT infrastructure. This is meant to empower your security teams to hunt, detect, and block high-fidelity malicious indicators at scale.</p><h3 id="network-defense-recommendations">Network Defense Recommendations</h3><p>Recorded Future recommends that organizations conduct the following measures in order to detect and mitigate suspected APT33 activity:</p><ul><li>Configure your intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defense mechanisms in place to alert on  and upon review, consider blocking illicit connection attempts from  the external IP addresses and domains listed in Appendix A.</li><li>As detailed in our previous blog on APT33 available to our clients only, Dynamic DNS (DDNS) continues to be a relevant operational choke point for security control implementation. All TCP/UDP network traffic involving DDNS subdomains should be blocked and logged (using <a href="https://tools.ietf.org/html/draft-ietf-dnsop-dns-rpz-00"  rel="noopener noreferrer">DNS RPZ</a> or similar).</li><li>Conduct regular Yara scans across your enterprise for the new rules listed in Appendix B.</li></ul><p>To view a full list of the associated indicators of compromise, <a href="https://go.recordedfuture.com/hubfs/reports/cta-2019-0626.pdf"  rel="noopener noreferrer">download the appendix</a>.</p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/iranian_cyber_operations_infrastructure_c35ebfde7e.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[The Economy of Credential Stuffing Attacks Report]]></title>
            <link>https://www.recordedfuture.com/credential-stuffing-attacks</link>
            <guid>https://www.recordedfuture.com/credential-stuffing-attacks</guid>
            <pubDate>Thu, 25 Apr 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[The Economy of Credential Stuffing Attacks]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_fcdc5a4ad0.png" alt="insikt-group-logo-updated.png"></p><p><em><a href="https://go.recordedfuture.com/hubfs/reports/cta-2019-0425.pdf">Click here</a> to download the complete analysis as a PDF.</em></p><p><em>This report covers the current threat landscape of credential stuffing attacks. It reviews the most popular tools used by cybercriminals to initiate credential stuffing and describes some of the most popular marketplaces that sell compromised credentials. This report contains information gathered using the Recorded Future Platform, as well as additional open source, dark web, and underground forum research, and will be of most interest to analysts protecting e-commerce, telecommunications, and financial organizations from credential stuffing attacks, as well as those looking for investigative leads on threat actors performing such attacks.</em></p><h3 id="executive-summary">Executive Summary</h3><p>The rapid proliferation of automated marketplaces on the dark web, fueled by the widespread availability of support infrastructure such as account-checking software, email and password combo lists, and proxy service providers, has created the perfect attack landscape for the abuse of thousands of popular web services such as e-commerce, financial services, travel websites, and telecommunications companies. It is safe to assume that almost every large organization with an online retail presence has had their users exposed to credential stuffing attacks in the past few years, with some companies having upwards of millions of exposed login credentials available for purchase on the dark web at any given moment.</p><h3 id="key-judgments">Key Judgments</h3><ul><li><p>The first widespread credential stuffing attacks were observed in late 2014, coinciding with the proliferation of automated underground marketplaces. When selling accounts, attackers offered the quick and easy monetization of compromised account credentials. Some actors who engaged in credential stuffing attacks remain active today. </p></li><li><p>With an investment of as little as $550, criminals could expect to earn at least 20 times the profit on the sale of compromised login credentials.</p></li><li><p>The overall supply of compromised login credentials across several large marketplaces exceeds tens of millions of accounts.</p></li><li><p>Insikt Group identified at least six popular variants of account-checking software used by cybercriminals; however, dozens of lesser-known variants can be found on the dark web.</p></li><li><p>While some companies may choose to implement multi-factor authentication (MFA), which blocks the credential stuffing attack vector, organizations may not be prepared to choose security over convenience.</p></li></ul><h3 id="background">Background</h3><p>Around late 2014 and in the beginning of 2015, we observed the widespread adoption of new dark web business models specifically tailored to facilitate a high volume of trades in a fully automated manner. Designed to emulate legitimate retail platforms such as eBay and Amazon, these so-called automated shops allow even low-level criminals to become vendors of stolen data, such as compromised login credentials, without having to worry about maintaining their own infrastructure or marketing campaigns. By and large, the adoption of account marketplaces was made possible primarily by the proliferation of account-checking software, or simply checkers, used as the main tool in credential stuffing attacks.</p><h3 id="threat-analysis">Threat Analysis</h3><p>Compromised account credentials were always a valuable commodity in the dark web  the number of transactions was relatively small, and they were primarily conducted either on a peer-to-peer basis or via semi-automated markets such as AlphaBay, Silk Road, and Hansa Market. In older models, buyers received their wares only after the seller manually approved the deal and delivered the purchased data. Moreover, sellers had to maintain the listings and communicate with the buyers personally.</p><p>However, with the advent of automated shops, the need for manual engagement was eliminated and the business of compromised accounts fully transitioned from peer-to-peer dealings to a much more democratized, open-to-everyone enterprise.</p><p>For a nominal 10 to 15 percent commission deducted from the amount of each sale, members can upload any number of validated compromised accounts, which in addition to email and password, often include data such as the account holders city or state of residency, transaction history, and/or account balance. All of this is valuable data to fraudsters seeking to buy accounts tailored to their specific needs. The vendors main focus is replenishing the stock, while all customer support, remittances, and dispute resolutions are handled by the shops support team.</p><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_1_1_a623ce2732.png" alt="credential-stuffing-attacks-1-1.png"></p><p>Automatic shop listings. Alongside the compromised company name, buyers can see the available balance or loyalty points, the account holders place of residency, associated payment cards, the date of the last transaction, and a hostname of the account holders login email.</p><p>At first, only a handful of select vendors became the primary suppliers of stolen data, but as the tradecraft was shared among members of the criminal underground, the business of stolen credentials has grown exponentially.</p><p>Since regular internet users tend to reuse the same passwords across multiple websites, threat actors quickly learned that instead of attempting to obtain access to an individual account, which may take a very long time, they should instead focus on hacking multiple random accounts, reducing their efforts.</p><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_2_1_847d4cb593.png" alt="credential-stuffing-attacks-2-1.png"></p><p>A combination of several elements made the hacking of various online services accounts not just effortless, but also incredibly lucrative. To launch account brute-forcing, also known as credential stuffing attacks, an attacker only needed brute-forcing software, a database of random email and password combinations, and access to a pool of proxies.</p><h4 id="the-economics">The Economics</h4><p>Early versions of checkers were made to target a single company and were sold for between $50 and $250, depending on the tools capabilities. These tools would attempt to log in to a website using an email and password combination obtained from a random database often obtained on the dark web. If a combination worked, it would be marked as valid. If not, the software would simply pick another combination from the list and attempt to log in again. For valid logins, more expensive and complex checkers would also collect additional information from the compromised account, such as linked banking and payment card information, account balances, the owners address, and even transaction history. Until this day, the ingenuity of the method truly lies in the economy of scale, allowing criminals to process hundreds of thousands of combinations in a very short period of time.</p><p>Eventually, several dominant players such as STORM, Black Bullet, and Sentry MBA entered the market with more robust tools, supporting an unlimited number of custom plugins, also called configs, which essentially offered hackers the capability to target almost any company with an online retail presence.</p><p>What had initially started as several hundred or several thousand compromised accounts quickly ballooned to hundreds of thousands, or even millions, of accounts. Some of the most prominent account shops have tens of millions of compromised accounts for sale at any given moment.</p><p>Although the competition quickly brought the average price of a single compromised account from over $10 down to a mere $1 to $2, the overall profitability of credential stuffing attacks increased significantly through sheer volume.</p><p>According to underground chatter observed over time, the average success rate for credential stuffing is anywhere between one to three percent. Hence, for every one million random combinations of emails and passwords, attackers can potentially compromise between 10,000 and 30,000 accounts. Moreover, the same database could then be reused over and over again to hack dozens of different websites, yielding even higher profits.</p><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_3_2_7644824639.png" alt="credential-stuffing-attacks-3-2.png"></p><p>Based on a conservative success rate of one percent per 100,000 compromised emails and passwords, the economics behind credential stuffing attacks reveals at least 20 times higher profit levels.</p><h3 id="technical-analysis">Technical Analysis</h3><p>Below are the most prominent variants of account-checking software used by cybercriminals in credential stuffing campaigns. It is important to note that lesser-known solutions, which are often built to target a single company, are also available for purchase. However, such one-off tools rarely gain significant market presence and tend to disappear quickly, as the developers cease product support due to slow adoption.</p><h4 id="storm">STORM</h4><p>STORM is marketed across several English-speking forums, and unlike other account-checking tools, is available free of charge. However, users are encouraged to make donations. The exact identity of the developer is unknown; however, according to underground forum chatter, the software was allegedly created by the actor mrviper. STORM was first launched in January 2018, and according to the description found on dark web advertisements, it is characterized as a free cracking program designed to perform website security testing. STORM is written in C language and was developed in close cooperation with members of the Cracked forum. The tool has the following technical features:</p><ul><li><p>Supports FTP cracking</p></li><li><p>Simultaneous FTP and HTTP attacks</p></li><li><p>Concurrent sessions</p></li><li><p>Debug functionality for activity analysis</p></li><li><p>Supports combo lists of up to 20 million email:password records</p></li><li><p>Supports HTTP/HTTPS</p></li><li><p>Supports SOCKS4 and SOCKS5</p></li><li><p>Proxy auto update with automated harvesting from public sources</p></li><li><p>Keywords capture (collection of premium account details)</p></li><li><p>JavaScript redirect</p></li></ul><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_4_1_c60b72ba61.png" alt="credential-stuffing-attacks-4-1.png"></p><p>STORM account cracker advertisement on the dark web.</p><p>Black Bullet</p><p>Black Bullet first appeared on the dark web in early 2018 and likely was created by the actor Ruri, who operates the official <a href="http://www.bullet%5B.%5Dblack">www.bullet[.]black</a> website; however, according to the information found on the main page, the community no longer accepts new members. Several members of the dark web, including daltonbean8 and Doberman, were observed distributing the tool.</p><p>In contrast to other account-checking tools, BlackBullet does not offer multi-threaded capabilities, and only allows a single company at a time to be attacked. The tool also comes with a brute-forcing feature that can perform dictionary attacks when run against specific accounts.</p><ul><li><p>Captchas bypass</p></li><li><p>Configuration files: ~ 530; however, users have an option to modify and create new configurations themselves</p></li><li><p>Selenium Webdriver support</p></li><li><p>Price: Between $30 and $50</p></li></ul><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_5_1_1699f81def.png" alt="credential-stuffing-attacks-5-1.png"></p><p>BlackBullet V.2.0.2 control panel interface.</p><h4 id="private-keeper">Private Keeper</h4><p>Private Keeper was developed by the actor deival909. According to the description provided by the actor, the tool is based on in-line technology. Private Keeper is by far the most popular account-checking software in the Russian-speaking underground.</p><ul><li><p>Price: From 49 Russian rubles (approximately $0.80)</p></li><li><p>Concurrent sessions</p></li><li><p>Utility software to aid in automated connection to the private or publicly available proxy services</p></li><li><p>Official online store: <a href="http://www.deival909%5B.%5Dru">www.deival909[.]ru</a></p></li><li><p>Latest version: 7.9.3.34</p></li></ul><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_6_1_dc4c15a180.png" alt="credential-stuffing-attacks-6-1.png"></p><p>Private Keeper control panel interface.</p><h4 id="snipr">SNIPR</h4><p>SNIPR was sold and publicly shared on multiple underground forums. The threat actor PRAGMA is the developer of the malware. SNIPR is a configurable account-checking software, written in C language that supports both online credential stuffing and offline brute-forcing dictionary attacks. Although the tool was advertised by multiple threat actors, this account checker has its own website with a forum and a marketplace <a href="http://www.snipr%5B.%5Dgg">www.snipr[.]gg</a>. The website allows third party developers to share custom-made configuration files.</p><ul><li><p>Configuration files: More than 100 are part of the official package</p></li><li><p>Concurrent attacks: Up to four targets</p></li><li><p>Price: $20</p></li></ul><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_7_1_348fb0779e.png" alt="credential-stuffing-attacks-7-1.png"></p><p>Over 100 config files are included in the SNIPR account checker by default.</p><h4 id="sentry-mba">Sentry MBA</h4><p>Sentry MBA, with over 1,000 configuration files available, is one of the most prominent and readily available examples of account-checking software on the dark web. Several criminal forums maintain ongoing discussion threads dedicated to Sentry MBA. As of December 2018, the registration at <a href="https://sentry%5B.%5Dmba">https://sentry[.]mba</a>, the official Sentry MBA marketplace and discussion board, is closed and available by invitation only. Insikt Group identified that the tool has been actively advertised on the dark web since late 2014. However, the official <a href="https://twitter.com/sentry_mba?lang=en" rel="noopener noreferrer">Twitter</a> account was launched in July 2013. The tool was allegedly developed by an actor using the alias Sentinel and later modified by another actor, Astaris. Sentry MBA uses OCR (optical character recognition) functionality to bypass captcha. However, Sentry MBA doesnt support Javascript anti-bot challenges. Sentry MBA can be configured to recognize specific keywords associated with a websites responses to successful and unsuccessful login attempts.</p><ul><li><p>Available Configs: More than 1000</p></li><li><p>Official Website: <a href="https://sentry%5B.%5Dmba">https://sentry[.]mba</a></p></li><li><p>Price: Between $5 and $20 per configuration file</p></li><li><p>Supports HTTP/HTTPS</p></li><li><p>Supports SOCKS4 and SOCKS5</p></li></ul><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_8_1_6f2665bbcf.png" alt="credential-stuffing-attacks-8-1.png"></p><p>Sentry MBA control panel.</p><h4 id="woxy">WOXY</h4><p>Unlike a typical account-checking software, the WOXY email checker allows criminals to verify the validity of email accounts, scan email content for valuable information (like gift card codes or online subscriptions to streaming services, travel websites, and financial institutions), and hijack valid accounts by resetting login passwords automatically. According to the conducted analysis, WOXY was developed by the actors Dreamzje and Deos, who operated the currently defunct website <a href="http://www.keepit%5B.%5Donline">www.keepit[.]online</a>. The original price of the WOXY checker was $40; however, in September 2018, actors Crank and Yuki shared the cracked version of WOXY on the dark web, which now can be easily obtained free of charge.</p><p><img src="https://cms.recordedfuture.com/uploads/credential_stuffing_attacks_9_1_406f3681f3.png" alt="credential-stuffing-attacks-9-1.png"></p><p>WOXY email checker V3.4 info.</p><h3 id="mitigation">Mitigation</h3><ol><li><p>Criminals will often use paid proxy services aside from using publicly available free proxies to further obfuscate attacks. However, our analysis shows that such services often use geo-spoofing techniques to create a wide pool of IPs. Such domains will have the same IP addresses, but they will use different subnets. Monitoring for web traffic activity from such IPs offers additional mitigation capabilities.</p></li><li><p>The introduction of multi-factor authentication has proven to be a highly effective mitigation practice for many organizations that historically experienced a high level of credential stuffing attacks. </p></li><li><p>Monitoring criminal underground communities for the availability of new configuration files targeting your organization, acquisition, and the thorough analysis of such files for additional attack indicators.</p></li><li><p>End users can reduce the risk of being victimized by a credential stuffing attack by using a password manager and setting a unique strong password for each online account.</p></li></ol>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/insikt_cover_cta_2019_0425_economy_credential_stuffing_attacks_4d4a5f4dac.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Pavlov’s Digital House: Russia Focuses Inward for Vulnerability Analysis Report]]></title>
            <link>https://www.recordedfuture.com/russian-vulnerability-analysis</link>
            <guid>https://www.recordedfuture.com/russian-vulnerability-analysis</guid>
            <pubDate>Mon, 16 Jul 2018 00:00:00 GMT</pubDate>
            <description><![CDATA[Pavlov’s Digital House: Russia Focuses Inward for Vulnerability Analysis]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/insikt_group_logo_updated_fcdc5a4ad0.png" alt="insikt-group-logo-updated.png"></p><p><em><a href="https://go.recordedfuture.com/hubfs/reports/cta-2018-0716.pdf">Click here</a> to download the complete analysis as a PDF.</em></p><p><em><strong>Scope Note</strong>: Over the course of the past year, Recorded Future has examined the <a href="https://www.recordedfuture.com/chinese-vulnerability-reporting/">publication speeds</a>, <a href="https://www.recordedfuture.com/chinese-vulnerability-data-altered/">missions</a>, and <a href="https://www.recordedfuture.com/chinese-mss-vulnerability-influence/">utility</a> of the national vulnerability databases (NVDs) of two countries: China and the United States. We decided to apply the same analytic techniques to Russias vulnerability database to see what we could learn. This report includes a detailed analysis of vulnerabilities published by the Federal Service for Technical and Export Control of Russia (FSTEC), official Russian government documents, Recorded Future data, and open source intelligence (OSINT). The data analyzed for this report was compiled on March 30, 2018.</em></p><h3 id="executive-summary">Executive Summary</h3><p>Russias vulnerability database is highly focused. However, it is incomplete, slow, and likely intended to support the control of the Russian state over technology companies and users. Generally, Russia publishes only 10 percent of known vulnerabilities, is on average 83 days slower than Chinas National Vulnerability Database (NVD), 50 days slower than the U.S. NVD, and incomplete in the few technologies it does cover. </p><h3 id="key-judgements">Key Judgements</h3><ul><li><p>Russias vulnerability database is run by the Federal Service for Technical and Export Control of Russia (FSTEC). FSTEC is the military organization responsible for protecting state secrets and supporting counterintelligence and counterespionage operations.</p></li><li><p>FSTECs vulnerability database is also known as the BDU (    ). The BDU has published only 11,036 vulnerabilities of the 107,901 CVEs reported by NVD (approximately 10 percent).</p></li><li><p>FSTEC has published 61 percent of vulnerabilities exploited by Russian state-sponsored threat groups. This is substantially above the norm of 10 percent; however, the data is insufficient to determine the influence of Russian intelligence services on FSTEC publication.</p></li><li><p>FSTEC populates the BDU database with vulnerabilities that primarily present a threat to Russian state information systems. This gives researchers information on which technologies, hardware, and software are used on Russian government networks.</p></li></ul><h3 id="background">Background</h3><p>The Federal Service for Technical and Export Control of Russia (<a href="http://fstec.ru" rel="noopener noreferrer">FSTEC</a>) was established in 2004 and is subordinate to the <a href="http://mil.ru" rel="noopener noreferrer">Ministry of Defense</a> (MOD). FSTEC has a central office in Moscow, seven regional headquarters, and an information security research and testing institute known as the <a href="http://fstec.ru/en/358-structure" rel="noopener noreferrer">State Science and Research Experimental Institute of Technical Information Protection Problems</a> of FSTEC, or the GNIII PTZI FSTEC.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_1_21768bb353.png" alt="russian-vulnerability-analysis-1.png"></p><p>FSTEC headquarters in Moscow, located at <a href="https://yandex.ru/maps/213/moscow/?z=17&amp;ll=37.662677%2C55.767258&amp;l=map%2Csat&amp;origin=jsapi_2_1_64&amp;from=api-maps&amp;um=constructor%3ADJ2c1xUsOxTzHA83unNAbGIxBcRqIDtx&amp;mode=usermaps" rel="noopener noreferrer">105066, Moscow, ul. Staraya Basmannaya, 17</a>.</p><p>The prime ministers official website describes FSTEC as a federal executive body responsible for implementing government policy, organizing interdepartmental cooperation and interaction, and exercising special and control functions in the area of state security.</p><p>According to further official documentation released in 2016, FSTEC implements state policy, organizes interdepartmental cooperation, and exercises special functions of state security in the fields of: </p><ul><li>Information systems security</li><li>Countering foreign technical threats to Russia</li><li>Security of state secrets</li><li>Export control</li></ul><p>As intimated in the organizations title, the first three areas fall squarely under the technical control mission. According to our extensive review of <a href="https://fstec.ru/normotvorcheskaya/poisk-po-dokumentam" rel="noopener noreferrer">FSTEC documentation</a>, export control likely assumes a much smaller share of FSTEC resources than all of the tasks and functions under technical control. The technical control mission covers internal control, state information systems, and foreign technology sold in Russia. </p><p>While <a href="https://fstec.ru/obshchaya-informatsiya/struktura" rel="noopener noreferrer">subordinate to the MOD</a>, FSTEC has a much longer and more extensive list of authorities, particularly in the realms of technical control and security of state secrets. According to <a href="https://fstec.ru/normotvorcheskaya/poisk-po-dokumentam" rel="noopener noreferrer">documentation</a> listed on FSTECs website, the organization also regulates commerce surrounding materials that could be used in chemical and nuclear weapons, counters technical intelligence, issues opinions on the use of Russian territory for foreign scientific research, and finances research on the study of radiation emitted from different types of systems and devices.</p><p>FSTEC also has a board of senior government officials <a href="https://fstec.ru/obshchaya-informatsiya/struktura" rel="noopener noreferrer">appointed by position</a>. This board includes the First Deputy Chief of the General Staff Department of the Russian Military, Deputy Minister of Internal Affairs, Head of the Economic Security Service under the Federal Security Service (FSB), and the Deputy Director of the SVR, among others. The primary <a href="http://pravo.gov.ru/proxy/ips/?docbody=&amp;nd=102088330" rel="noopener noreferrer">function of the board</a> is setting and administering the FSTEC budget, as well as coordinating interdepartmental functions. </p><p>Among the <a href="http://pravo.gov.ru/proxy/ips/?docbody=&amp;nd=102088330" rel="noopener noreferrer">myriad responsibilities</a> under the four primary FSTEC functions, the organization also works with the FSB in protecting state secrets, supports technical counterintelligence and counterespionage,<sup>1</sup> and is empowered to monitor the communications of government officials who work with state secrets.</p><p>FSTEC is currently run by Director <a href="https://fstec.ru/obshchaya-informatsiya/rukovoditeli/282-direktor-fstek-rossii" rel="noopener noreferrer">Vladimir Selin</a>, who has been in that position since May 2011. Selin is supported by one First Deputy Director, <a href="https://fstec.ru/obshchaya-informatsiya/rukovoditeli/283-pervyj-zamestitel-direktora-fstek-rossii" rel="noopener noreferrer">Sergey Yakimov</a>, and <a href="https://fstec.ru/obshchaya-informatsiya/rukovoditeli" rel="noopener noreferrer">four Deputy Directors</a>. In addition to his position as Director of FSTEC, Selin is also a member of the <a href="https://structure.mil.ru/management/college_of_the_russian_defense_ministry.htm" rel="noopener noreferrer">Defense Ministry Board</a>, and <a href="https://chelorg.com/2016/10/10/putin-approved-the-new-composition-of-the-interdepartmental-commission-on-protection-of-state-secrets/" rel="noopener noreferrer">Deputy Chairman</a> of the Commission on State Secrets (on which he sits with Chief of the General Staff of the Russian Military <a href="http://eng.mil.ru/en/management/deputy/more.htm?id=11113936@SD_Employee" rel="noopener noreferrer">General Valery Gerasimov</a>). </p><p>According to official state documents, in 2015 <a href="http://pravo.gov.ru/proxy/ips/?docbody=&amp;nd=102088330" rel="noopener noreferrer">FSTEC was assigned</a> a total of 1,111 employees, not including security, protection, or maintenance personnel. Of the 1,111 employees, 225 are located in the Moscow headquarters, and the remaining 886 are spread out over FSTECs seven regional offices. </p><p>Given the mission focus on technical control, it is likely that the majority of these 1,111 employees work on issues related to this mandate, while a much smaller minority support FSTECs export control work. </p><h4 id="fstecs-vulnerability-publication-process">FSTECs Vulnerability Publication Process</h4><p>FSTEC also runs a vulnerability publication database, to which it provides public access via the website <a href="http://bdu.fstec.ru/vul" rel="noopener noreferrer">bdu.fstec.ru/vul</a>. The <a href="https://bdu.fstec.ru/" rel="noopener noreferrer">homepage</a> states that the purpose of the database is to increase the awareness of interested persons in existing threats to information security systems and that it is designed for a wide range of customers, operators, developers, information security professionals, testing laboratories, and certification bodies.</p><p>FSTEC also states that the database contains information about the main threats to information security and vulnerabilities, primarily those characteristic of state information systems and automated systems for managing production and technological processes of critical facilities.<sup>2</sup></p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_2_3b34055e1b.png" alt="russian-vulnerability-analysis-2.png"></p><p><a href="https://bdu.fstec.ru/" rel="noopener noreferrer">Homepage</a> of FSTECs Security Threats Database, which lists the purpose and intended audience for the data.</p><p>FSTEC does not claim that this database is exhaustive. Instead, it focuses on publishing vulnerabilities for information systems used by the state and in critical facilities. This mission is also exhibited in the responsibilities and activities of FSTECs seven regional departments. The <a href="https://fstec.ru/territorialnye-organy-cfo/tsentralnyj-federalnyj-okrug/informatsiya-cfo/polnomochiya-cfo" rel="noopener noreferrer">majority of tasks levied upon each of the regional headquarters</a> are overwhelmingly centered around countering foreign technical intelligence and protecting state information systems and data within each district. Of the <a href="https://fstec.ru/territorialnye-organy-yufo/yuzhnyj-i-severo-kavkazskij-federalnye-okruga/informatsiya-yufo/polnomochiya-yufo" rel="noopener noreferrer">10 or 11</a> tasks levied upon each of the regional headquarters, the top seven all concern countering foreign technical intelligence collection and protecting state information systems, while the remaining relate to export control. </p><p>Reporting a threat or vulnerability to the database (known as the BDU) is relatively simple. FSTEC provides a form for submission which closely matches the vulnerability entries themselves.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_3_f4a903526f.png" alt="russian-vulnerability-analysis-3.png"></p><p>FSTEC vulnerability <a href="https://bdu.fstec.ru/contacts/vulreport" rel="noopener noreferrer">submission form</a>.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_4_38ee95a887.png" alt="russian-vulnerability-analysis-4.png"></p><p>FSTEC BDU entry for <a href="https://bdu.fstec.ru/vul/2018-00817" rel="noopener noreferrer">CVE-2018-8148</a>.</p><p>FSTEC even provides simple download links to retrieve its entire database as either Excel or XML files. These downloads contain fields typical of other vulnerability databases including internal IDs, corresponding CVE identifiers, affected technologies, links to supporting documents, severity assessments, etc. What is not included in the publication is the date for when FSTEC first disclosed the vulnerability. We used proprietary techniques to establish these dates for vulnerabilities disclosed by FSTEC since January 1, 2017.</p><h4 id="fstec-is-not-a-public-service-organization">FSTEC Is Not a Public Service Organization</h4><p>FSTEC is an organization subordinate to, run by, and administratively part of the Ministry of Defense (MOD). All current <a href="https://fstec.ru/obshchaya-informatsiya/rukovoditeli" rel="noopener noreferrer">FSTEC senior leadership</a>, including the director, deputy directors, and all heads of regional headquarters<sup>3</sup> are former military officers, many of whom also served concurrently in officer or reserve positions in previous roles within FSTEC.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_5_bb96b9066f.png" alt="russian-vulnerability-analysis-5.png"></p><p>Screenshot of the <a href="https://fstec.ru/territorialnye-organy-pfo/privolzhskij-federalnyj-okrug/informatsiya-pfo/rukovoditel-pfo" rel="noopener noreferrer">biography of Pavel Maksyakov</a>, head of the FSTEC Volga District office.</p><p>FSTECs primary mission is explicit, documented, and repeated in <a href="https://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty/107-zakony" rel="noopener noreferrer">law after law</a> and <a href="https://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty/110-prikazy" rel="noopener noreferrer">order after order</a>; state security is its overarching mandate. Unlike sister organizations in other countries, such as <a href="http://www.itsec.gov.cn/" rel="noopener noreferrer">CNITSEC</a> in China (which runs <a href="http://www.cnnvd.org.cn/" rel="noopener noreferrer">CNNVD</a>), FSTEC does not claim to have a public service mission, but instead populates its vulnerability database (BDU) with vulnerabilities that primarily present a threat to state information systems. However, FSTEC is dissimilar to CNITSEC in that FSTEC is an overt military organization with an overt state secrecy mission. </p><p>A <a href="https://fstec.ru/deyatelnost/mezhdunarodnaya-deyatelnost/62-ofitsialnye-teksty/930-protokol-k-soglasheniyu-mezhdu-pravitelstvom-rossijskoj-federatsii-i-pravitelstvom-kitajskoj-respubliki" rel="noopener noreferrer">2014 meeting</a> between Chinese Premier Li Keqiang and Russian Prime Minister Dmitry Medvedev indicates that the Russian government views the Chinese Ministry of Commerce as the functional Chinese counterpart to FSTEC, not CNITSEC or the Ministry of State Security. This is probably because of FSTECs primary focus on technical control of the domestic information and technology environment, which is a much broader mission than CNITSECs.</p><p>Since FSTEC is an overt military organization, the questions about FSTECs vulnerability database primarily center around why FSTEC even publishes the few vulnerabilities that it does. As documented below, the BDU is extremely slow and not comprehensive. The few vulnerabilities it does publish tell us more about FSTECs mission and Russian state information systems than the intentions of the Russian military for offensive cyber operations.</p><h3 id="threat-analysis">Threat Analysis</h3><p>FSTEC began publishing vulnerability data in 2014, roughly 15 years after the U.S. National Vulnerability Database (NVD) <a href="https://nvd.nist.gov/General" rel="noopener noreferrer">was established</a>. As seen below, the FSTEC vulnerabilities published by year demonstrate an initial low volume of publications in 2014, a surge in 2015, and then a lower level of publications between 2016 and 2018.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_6_1f6e2ac8ff.png" alt="russian-vulnerability-analysis-6.png"></p><p>Russian vulnerabilities published by year.</p><h4 id="what-happened-in-2015">What Happened in 2015?</h4><p>In examining the mapping of FSTECs BDU identifiers to NVDs CVE identifiers, we observed that the mappings were not always one to one. FSTEC occasionally linked multiple CVEs into a single BDU vulnerability, and also occasionally created multiple BDU identifiers for different operating systems vulnerable to a single CVE. Russian BDUs cover 11,036  or approximately 10 percent  of the 107,901 CVEs reported by NVD. This difference is not simply due to FSTEC starting later, as approximately 25 percent of CVEs covered by FSTEC were from years before FSTEC began operation.</p><p>Despite the non-linear correlation between BDU and CVE identifiers, it is clear that FSTEC published far more vulnerabilities in 2015 than any other year. This is probably because 2015 was an experimental year for the BDU database, in which FSTEC evaluated its functionality and utility. Although the 2015 FSTEC annual activity report (issued in March 2016) did not address the outcome of the BDU experiment, it is clear from the data that a decision was made to drastically reduce the scope and number of vulnerabilities published. A narrower scope is also in better alignment with the databases <a href="https://bdu.fstec.ru/" rel="noopener noreferrer">public mission</a>, which is to report on vulnerabilities in information systems used by the state or in critical facilities.</p><p>Furthermore, among the vulnerabilities that FSTEC published the fastest, 75 percent were vulnerabilities for browsers or industrial control-related software. </p><p>In <a href="https://www.recordedfuture.com/chinese-vulnerability-reporting/">previous reporting</a>, we assessed the differing rates of vulnerability disclosure publications between the Chinese and U.S. national vulnerability databases and learned that the Chinese are much faster at disclosure on average than the United States. We examined the set of vulnerabilities published in 2017 to 2018 that were in common among the three national vulnerability databases and observed that Russian vulnerability disclosure dramatically lags behind both U.S. and Chinese disclosure. Russian vulnerability disclosure is not only incomplete, but also extremely slow.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_7_f361d9e5f2.png" alt="russian-vulnerability-analysis-7.png"></p><p>Days of vulnerability disclosure delay across different national vulnerability databases.</p><p>To better understand how FSTEC selected vulnerabilities to disclose, we examined the technology vendors that FSTEC covered at a higher rate than expected given its overall coverage level of 10 percent. The black line in the two charts below (at the value for 10) represents the 10 percent of all vulnerabilities that FSTEC publishes. All vendors with coverage under 10 percent are considered under covered, and all vendors substantially over 10 percent are considered over covered.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_8_8d8962ab3f.png" alt="russian-vulnerability-analysis-8.png"></p><p>Percentage of vendor CVEs covered by FSTEC.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_9_70933cc3b2.png" alt="russian-vulnerability-analysis-9.png"></p><p>Percentage of vendor CVEs covered by FSTEC.</p><p>Similar analysis suggests that FSTEC significantly under covered content management systems (such WordPress, Joomla, and Drupal), as well as IBM and Huawei compared to its baseline level of coverage across all technologies. </p><h4 id="coverage-of-russian-apt-vulnerabilities">Coverage of Russian APT Vulnerabilities</h4><p>In a 2016 Recorded Future <a href="https://www.recordedfuture.com/russian-apt-toolkits/">publication</a>, we provided an analysis of vulnerabilities used by Russian APTs, and in particular, which vendors were most widely represented.</p><p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_10_aae2319f57.png" alt="russian-vulnerability-analysis-10.png"></p><p>Image from a Recorded Future blog, <a href="https://www.recordedfuture.com/russian-apt-toolkits/">Running for Office: Russian APT Toolkits Revealed</a>.</p><p>Vendors for all of these technologies were listed in the areas that FSTEC over focused on. This means that FSTEC published far more than 10 percent of the vulnerabilities discovered for each vendor. However, each of these vendors produces some of the most widely used software in the world and it would be reasonable to expect that Russian APT groups would target these technologies.</p><p>To explore this point more thoroughly, we also conducted an updated analysis of all vulnerabilities exploited by Russian APT groups in the last four years. Utilizing only vulnerabilities with a CVE number and those which were also published by U.S. NVD and CNNVD, we identified 49 vulnerabilities that had been utilized by Russian APT groups in that timeframe. </p><p>Thirty of those 49 vulnerabilities, or 61 percent, were published by FSTEC. This is substantially higher than FSTECs average of 10 percent. Further, 18 of those 30 published vulnerabilities have been exploited by APT28, which has been <a href="https://carnegieendowment.org/files/CP_333_BrattbergMaurer_Russia_Elections_Interference_FINAL.pdf" rel="noopener noreferrer">attributed</a> to the Russian militarys Main Intelligence Directorate (GRU). This amounts to FSTEC publishing 60 percent of vulnerabilities exploited by the Russian military. This is far outside FSTECs statistical average of 10 percent.</p><p>Again, many of these vulnerabilities are for the most widely used software in the world. However, this abnormally high reporting rate for both the software vendors and vulnerabilities themselves raises two possibilities. First, since FSTECs mission is to protect Russian government information systems, this indicates that Russian government systems utilize these programs and were themselves exposed to these vulnerabilities as well. This is further confirmation that examining FSTEC publications can yield insight into Russian government information systems.</p><p>Second, FSTEC is a military organization, has several <a href="https://fstec.ru/obshchaya-informatsiya/struktura" rel="noopener noreferrer">military intelligence members</a> on its board, and would regularly interact with military intelligence to protect classified systems. It is possible that military intelligence could be obligated to protect Russian state information systems with knowledge they possessed on vulnerabilities, or that Russian military hackers could be leveraging vulnerabilities published by FSTEC for their operations. </p><p>The public record and available data is not yet sufficient to determine the relationship between FSTEC and Russian state-sponsored cyber operations. However, it is clear that FSTECs vulnerability database is utilized by Russian intelligence services in a different manner than CNNVD is by Chinese intelligence. In China, CNNVD delays or hides the publication of vulnerabilities being used by the intelligence services, while in Russia, it is possible that FSTEC publishes vulnerabilities being used by the intelligence services in order to protect against them. </p><p>The only high-coverage vendor covered by FSTEC but not listed above is Novell. </p><p>From our over-coverage analysis, we know FSTEC focuses on Adobe more than any other individual vendor by covering nearly half of all Adobe vulnerabilities. However, when we took a closer look at the Adobe vulnerabilities not covered by FSTEC, we observed that FSTEC has not published 386 Adobe vulnerabilities with a CVSS score of 10, or 871 Adobe vulnerabilities with a CVSS score greater than eight. FSTEC is not even comprehensive on vulnerability disclosure for the technology area in which the data clearly shows the most interest.</p><p>If FSTEC was a serious resource for vulnerability information, it would have to be faster and more comprehensive. Even FSTECs <a href="https://bdu.fstec.ru/site/partners" rel="noopener noreferrer">corporate partners</a> do not claim to exclusively use the BDU database. We examine three hypotheses for why FSTEC publishes so few vulnerabilities below.</p><h4 id="technology-licensing">Technology Licensing</h4><p>A primary portion of FSTECs technical control mission is to conduct <a href="https://fstec.ru/deyatelnost/gosudarstvennye-funktsii-i-uslugi/88-kratkaya-informatsiya-o-gosudarstvennykh-uslugakh/267-perechen-gosudarstvennykh-uslug-predostavlyaemykh-fstek-rossii" rel="noopener noreferrer">product reviews</a> and <a href="https://fstec.ru/litsenzionnaya-deyatelnost/tekhnicheskaya-zashchita-informatsii/76-inye/236-perechen02" rel="noopener noreferrer">issue licenses</a> to companies that want to sell their products in Russia. According to a <a href="https://www.reuters.com/article/us-usa-russia-tech-idUSKBN19E0XB" rel="noopener noreferrer">June 2017 Reuters article</a>, both the FSB and FSTEC conduct reviews of foreign technology including source code for security products such as firewalls, antivirus applications, and software containing encryption before permitting the products to be imported and sold in the country. The FSB reportedly utilizes certified partner companies to conduct some of the reviews, including a company called <a href="https://npo-echelon.ru/" rel="noopener noreferrer">Echelon</a>, which is also a <a href="https://bdu.fstec.ru/site/partners" rel="noopener noreferrer">partner to FSTEC</a> in administration of the BDU database.</p><p>According to <a href="https://npo-echelon.ru/services/licensing/" rel="noopener noreferrer">Echelon</a> and the websites of a number of other certified FSTEC partners,<sup>4</sup> the FSB is responsible for the reviews of cryptographic and encryption tools, while FSTEC issues licenses for the development or production and technical protection of confidential information. FSTEC licenses are broadly required for the production and sale of software in Russia.</p><p>Among <a href="https://bdu.fstec.ru/site/partners" rel="noopener noreferrer">FSTECs partners</a> in administering the BDU, including <a href="https://dsec.ru/" rel="noopener noreferrer">Digital Security</a>, <a href="http://www.ispras.ru/" rel="noopener noreferrer">Institute of System Programming of The V.P. Ivannikova Russian Academy of Science</a>, <a href="http://rusbitech.ru/" rel="noopener noreferrer">Rusbitech</a>, <a href="https://www.altx-soft.ru/" rel="noopener noreferrer">All-Tech-Soft</a>, and <a href="https://amonitoring.ru/" rel="noopener noreferrer">Perspective Monitoring</a>, only Echelon claims to be able to assist customers with FSTEC, FSB, and MOD reviews.</p><p>However, unlike the FSB, FSTEC does not use partners or intermediaries to conduct its reviews. In October 2016, FSTEC <a href="https://fstec.ru/normotvorcheskaya/informatsionnye-i-analiticheskie-materialy/1186-informatcionnoe-soobschenie-0001" rel="noopener noreferrer">issued a clarification on its website</a>, stating that FSTEC does not interact with intermediaries and does not work with any private organizations in the provision of government services for licensing.</p><p>FSTEC publishes a registry of licensees for each certification it issues. Fourteen licenses have been issued in 2018 for the <a href="https://fstec.ru/litsenzionnaya-deyatelnost/tekhnicheskaya-zashchita-informatsii/72-reestry/217-reestr02" rel="noopener noreferrer">development and production registry</a>, while 66 <a href="https://fstec.ru/litsenzionnaya-deyatelnost/tekhnicheskaya-zashchita-informatsii/72-reestry/216-reestr01" rel="noopener noreferrer">technical protection licenses</a> have been issued this year (as of July 9, 2018). This is in contrast to the 140 development and production licenses and 293 technical protection licenses issued in 2017. </p></p><p>Many well-known international companies have received these certifications, including Honeywell, Alcatel-Lucent, Kaspersky, Huawei, Hewlett-Packard, Bombardier, Atos, and Symantec.<p><img src="https://cms.recordedfuture.com/uploads/russian_vulnerability_analysis_12_247614e5d1.png" alt="russian-vulnerability-analysis-12.png"></p><p>Timeline of foreign technology inspections conducted by FSTEC.</p><p>The <a href="https://fstec.ru/litsenzionnaya-deyatelnost/tekhnicheskaya-zashchita-informatsii/75-postanovleniya/225-postanovlenie-pravitelstva-rossijskoj-federatsii-ot-3-fevralya-2012-g-n-79" rel="noopener noreferrer">criteria for obtaining an FSTEC license</a> are so broad that it is difficult to assess which information from a software company would be deemed unnecessary to the approval process. Further, despite the different certification regimes and credentials, the <a href="https://fstec.ru/litsenzionnaya-deyatelnost/tekhnicheskaya-zashchita-informatsii/75-postanovleniya/224-postanovlenie-pravitelstva-rossijskoj-federatsii-ot-3-marta-2012-g-n-171" rel="noopener noreferrer">information</a> a company must share with FSTEC is very similar to that required by the <a href="https://fstec.ru/litsenzionnaya-deyatelnost/tekhnicheskaya-zashchita-informatsii/75-postanovleniya/224-postanovlenie-pravitelstva-rossijskoj-federatsii-ot-3-marta-2012-g-n-171" rel="noopener noreferrer">FSB for its licensure</a>. This includes extensive data on personnel, facilities, products, software production and testing, and more.</p><h3 id="outlook">Outlook</h3><h4 id="why-does-fstec-publish-so-few-vulnerabilities">Why Does FSTEC Publish so Few Vulnerabilities?</h4><p>As the research above demonstrates, FSTEC broadly publishes only about 10 percent of known vulnerabilities. The larger question is, Why? Why waste resources on a vulnerability disclosure database that does not address 90 percent of vulnerabilities for its users? There are three likely hypotheses:</p><ol><li><p>FSTEC is vastly under resourced and can only focus on key technologies for Russian users and key vulnerabilities of these technologies.</p></li><li><p>FSTEC is a military organization and is publishing just enough content to be credible as a national vulnerability database. The Russian government needs vulnerability research as a baseline for FSTECs other technical control responsibilities, such as requiring reviews of foreign software.</p></li><li><p>FSTEC has a dual offensive and information security mission and publishes based on the competing needs. This would be similar to how Chinas NVD (CNNVD) functions.</p></li></ol><p>In <a href="https://www.recordedfuture.com/chinese-vulnerability-reporting/">prior research</a>, we disclosed that the <a href="https://www.nist.gov/itl" rel="noopener noreferrer">NIST Information Technology Laboratory</a> (ITL) employs about 400 scientific and technological staff and possesses a budget of roughly $120 million annually. The ITL is comprised of seven divisions and runs numerous databases and systems, including the U.S. NVD. In comparison, Russias FSTEC has 1,111 employees, not including security, protection, or maintenance personnel, and a roughly comparable (if not slightly larger) bureaucratic structure and mission scope. While NIST ITL and FSTEC are not analogous organizations, this loose comparison does demonstrate that FSTEC is not vastly under resourced for its mission and that reporting only 10 percent of published vulnerabilities is a function of choice and not due to resource constraints.</p><p>Further, FSTEC does not even provide adequate coverage of the technology it focuses on most. As shown in our example above, FSTEC has published about half of all Adobe vulnerabilities; however, it is still missing over 1,000 Adobe vulnerabilities with a CVSS of critical or high. If Adobe truly were that important to it, then FSTEC would not omit the publication of these vulnerabilities with the highest possible severity scores. This leads to the conclusion that FSTEC does not determine the need for publication simply by focusing on several key technologies. This also rules out hypothesis number one, that FSTEC is hugely under resourced and does not have the personnel or capital to keep up with NVD.</p><p>Second, we find no evidence to support hypothesis number three, that FSTEC is following CNNVDs model in trying to balance public disclosure and offensive cyber missions. FSTEC is not a public service organization  its database is not comprehensive or timely and does not publish enough vulnerabilities to support a broadly protective mission. FSTECs mission, instead, is very focused and specific: to protect Russian state and critical infrastructure systems and support counterintelligence efforts.</p><p>Additionally, FSTEC over reports on vulnerabilities that have been exploited by Russian state-sponsored threat groups, while CNNVD delays or hides the publication of vulnerabilities that have been utilized by Chinese intelligence. If anything, FSTEC might be a little too focused in its support of Russian state information systems, as the few vulnerabilities it does publish yield insight into Russian government priorities and software.</p><p>Finally, we assess with high confidence that hypothesis number two accurately describes the mission and intent of Russias NVD. This intent is that FSTECs vulnerability database provides a baseline for state information systems and legitimate cover for foreign technology reviews. According to <a href="http://pravo.gov.ru/proxy/ips/?docbody=&amp;nd=102427980&amp;intelsearch=BDU" rel="noopener noreferrer">February 2017 amendments</a> to FSTEC documentation regarding inspection and requirements for state information systems, vulnerabilities in the BDU database are intended to provide a baseline of security  not a comprehensive vulnerability listing  for state information systems. This is further demonstrated by the surge in vulnerability publication during 2015, which was an experimental year for the databases future functionality and led to subsequent publication declines. Our research and data indicate that the BDU database is not intended to be comprehensive, but is simply a baseline for government information systems security and software inspections.</p><p>It is also possible that given the <a href="https://fstec.ru/litsenzionnaya-deyatelnost/tekhnicheskaya-zashchita-informatsii/75-postanovleniya/224-postanovlenie-pravitelstva-rossijskoj-federatsii-ot-3-marta-2012-g-n-171" rel="noopener noreferrer">functional</a>, <a href="https://fstec.ru/obshchaya-informatsiya/struktura" rel="noopener noreferrer">managerial</a>, and informal overlaps between FSTEC and the FSB, some of the BDU databases focus on the exact technologies Russian APT groups are known to favor could be derivative of FSB knowledge about its own operations and the exploitability of these technologies. There is minimal evidence to support this theory, aside from the overlap between the vulnerabilities that FSTEC over covers and those most used by Russian APT groups.</p><p>To this end, the vulnerabilities that FSTEC does publish convey more information about the hardware and software Russian government organizations use on their networks than which vulnerabilities they will target in offensive cyber operations.</p><div id="footnote"><sup>1</sup>According to the <a href="https://www.dni.gov/index.php/ncsc-home" rel="noopener noreferrer">National Counterintelligence and Security Center</a>s (NCSC) <a href="https://www.dni.gov/files/NCSC/documents/ci/CI_Glossary.pdf" rel="noopener noreferrer">Counterintelligence Terms Glossary</a>, counterespionage (CE) is a unique subset of counterintelligence and is the offensive, or aggressive, side of counterintelligence. CE is an offensive operation, a means of obtaining intelligence about the opposition by using  or, more usually, attempting to use  the oppositions operations.<p><sup>2</sup>This content was machine translated using <a href="https://translate.google.com/" rel="noopener noreferrer">Google Translate</a>.</p><p><sup>3</sup>Biographies of each regional head can be found under the   tab at <a href="https://fstec.ru" rel="noopener noreferrer">https://fstec.ru</a>.</p><p><sup>4</sup>See <a href="http://rusbitech.ru/about/certificate/" rel="noopener noreferrer">http://rusbitech.ru/about/certificate/</a>, <a href="https://www.ntcsiz.ru/site/view?id=1" rel="noopener noreferrer">https://www.ntcsiz.ru/site/view?id=1</a>, and <a href="https://www.altx-soft.ru/license.htm" rel="noopener noreferrer">https://www.altx-soft.ru/license.htm</a>.</p></div>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/insikt_cover_cta_2018_0716_pavlovs_digital_house_7efcd8b5b0.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Q4 Malware Trends: Year Punctuated by Ransomware and Data Breaches Concludes With Sophisticated SolarWinds Attack]]></title>
            <link>https://www.recordedfuture.com/q4-malware-trends</link>
            <guid>https://www.recordedfuture.com/q4-malware-trends</guid>
            <pubDate>Tue, 19 Apr 2022 04:58:06 GMT</pubDate>
            <description><![CDATA[This report continues our quarterly series analyzing trends in malware use, distribution, and development throughout 2020. Insikt Group used the Recorded Future® Platform to look at mainstream news, security vendor reporting, technical reporting around malware, vulnerabilities, security breaches, and dark web and underground forums from October 1 to December 31, 2020, to examine major trends to malware impacting desktop systems and mobile devices. ]]></description>
            <content:encoded><![CDATA[<p><img src="https://cms.recordedfuture.com/uploads/Primary_Logo_Insikt_Digital_RGB_45f99b2dc9.png" alt="Primary Logo - Insikt - Digital (RGB).png"></p><p><em><strong>Editors Note</strong>: The following post is an excerpt of a full report. To read the entire analysis, <!--HubSpot Call-to-Action Code --><span class="hs-cta-wrapper" id="hs-cta-wrapper-a25a29e3-7a33-4b02-8de6-5a163c057776"><span class="hs-cta-node hs-cta-a25a29e3-7a33-4b02-8de6-5a163c057776" id="hs-cta-a25a29e3-7a33-4b02-8de6-5a163c057776"><!--[if lte IE 8]><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/252628/a25a29e3-7a33-4b02-8de6-5a163c057776" ><img class="hs-cta-img" id="hs-cta-img-a25a29e3-7a33-4b02-8de6-5a163c057776" style="border-width:0px;" src="https://no-cache.hubspot.com/cta/default/252628/a25a29e3-7a33-4b02-8de6-5a163c057776.png"  alt="click here"/></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(252628, 'a25a29e3-7a33-4b02-8de6-5a163c057776', {}); </script></span><!-- end HubSpot Call-to-Action Code --> to download the report as a PDF.</em></p><p><em>This report continues our quarterly series analyzing trends in malware use, distribution, and development throughout 2020. Insikt Group used the Recorded Future Platform to look at mainstream news, security vendor reporting, technical reporting around malware, vulnerabilities, security breaches, and dark web and underground forums from October 1 to December 31, 2020, to examine major trends to malware impacting desktop systems and mobile devices. The trends outlined below illustrate the tactics, techniques, and procedures (TTPs) that had a major impact on technology. This report will assist threat hunters and security operations center (SOC) teams in strengthening their security posture by prioritizing hunting techniques and detection methods based on this research and data.</em></p><h3 id="executive-summary">Executive Summary</h3><p>In Q4 2020, ransomware operators continued to have an opportunistic mindset when conducting campaigns, putting more emphasis on data theft extortion to increase their chances of profitability. There was an increase in Egregor activity throughout the quarter, likely due to Maze ransomware operators shutting down. There was also an increase in Conti ransomware as use of Ryuk, a persistent ransomware family throughout the year, plateaued. </p><p>Arguably the most significant malware attack of 2020 was disclosed to the public in this period: the SolarWinds supply chain attack. This attack was significant due to the sophistication of the attack along with the volume of prominent organizations impacted, including United States government entities, along with several prominent technology companies and cybersecurity organizations. As this attack is still being investigated, it is likely that there will be more details released associated with victims targeted and infrastructure used. </p><p>Trickbot, a malware family that has been persistent and prominent throughout the year, went through notable changes in Q4 2020, as multiple organizations worked together to take down the malwares infrastructure before the November 2020 U.S. presidential election. While these efforts temporarily reduced Trickbot activity, the use of QakBot, a discrete loader malware, began to increase, likely as threat actors shifted away from Trickbot. </p><p>Lastly, Android malware continued to dominate the mobile malware landscape this quarter, with two new mobile malware variants emerging. While COVID-19-themed mobile malware activity dipped in Q3 after a high during the first half of the year, Insikt Group observed a resurgence of activity in Q4. This was especially true as virus cases increased and digital assets (websites, mobile applications, and so on) regarding the COVID-19 vaccine were released. </p><p><em><strong>Editors Note</strong>: This post was an excerpt of a full report. To read the entire analysis, <!--HubSpot Call-to-Action Code --><span class="hs-cta-wrapper" id="hs-cta-wrapper-a25a29e3-7a33-4b02-8de6-5a163c057776"><span class="hs-cta-node hs-cta-a25a29e3-7a33-4b02-8de6-5a163c057776" id="hs-cta-a25a29e3-7a33-4b02-8de6-5a163c057776"><!--[if lte IE 8]><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/252628/a25a29e3-7a33-4b02-8de6-5a163c057776" ><img class="hs-cta-img" id="hs-cta-img-a25a29e3-7a33-4b02-8de6-5a163c057776" style="border-width:0px;" src="https://no-cache.hubspot.com/cta/default/252628/a25a29e3-7a33-4b02-8de6-5a163c057776.png"  alt="click here"/></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(252628, 'a25a29e3-7a33-4b02-8de6-5a163c057776', {}); </script></span><!-- end HubSpot Call-to-Action Code --> to download the report as a PDF.</em></p>]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure url="https://cms.recordedfuture.com/uploads/q4_malware_trends_80a13bdb36.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>