Skip to main content
News

Cyber News Rundown: NCR, falls victim to BlackCat/ALPHV ransomware

Cyber News Rundown: NCR, falls victim to BlackCat/ALPHV ransomware
Forum|alt.badge.img+7
  • Threat Research Analyst
  • 4 replies

Over the weekend, one of the largest payment solutions providers, NCR, confirmed that the data centers for their Aloha POS (Point of Sale) software had been compromised by a ransomware attack. The BlackCat/ALPHV ransomware group claimed responsibility for the attack and stated that instead of stealing the data stored on the Aloha servers, they had taken all the client credentials, and were expecting a ransom to be paid before posting the full list to their leak site.

Custom PowerShell tool allowing threat actors to silently exfiltrate data

Researchers have identified several instances of the Vice Society ransomware group using a custom PowerShell script to exfiltrate data from a victim’s system without raising any warnings. The script runs a series of jobs to identify files and directories that are on the inclusion list, looking for keywords, and avoiding files smaller than 10KB. By concentrating on a smaller scope of files and criteria, it minimizes the drain on device resources to avoid detection, and only takes data that the threat actors deem valuable.

Domino backdoor draws inspiration from multiple threat groups

A new malicious backdoor has been identified by researchers as ‘Domino’ and appears to have connections to both the FIN7 APT (Advanced Persistent Threat) group and former members of the Conti ransomware group. Domino uses a significant amount of code and functionality from the Lizar malware family, which was originally tied to FIN7 and has been actively deployed for several years. More recently, Domino has been seen using Dave Loader, which has been developed and maintained by former members of the Conti ransomware group to deploy ransomware payloads.

PaperCut software warns users of RCE vulnerability

Officials for the print management software company, PaperCut, have recently begun contacting their customers about a remote code execution (RCE) flaw that could allow network intrusion by hackers. The company is urging all users to update their software to the latest versions, to avoid any unauthorized access, though they also acknowledge that it is up to the system admins to thoroughly investigate their own networks for suspicious activity.

Qakbot campaign uses fake business emails

The latest campaign from the prolific Qakbot banking trojan has been spotted using spoofed business emails to enter an ongoing email thread and begin posting their own messages with malicious PDF attachments. This campaign relies on compromising email threads and using the previous sender’s name but switching out the email address, and then hoping the victim is trusting enough to open the PDF attachment, which launches the malicious scripts. Beyond the email-focus, this campaign of Qakbot remains the same as previous campaigns, by quickly extracting stored credentials and dropping additional malware payloads.  

Did this help you find an answer to your question?

9 replies

ProTruckDriver
Moderator

Thanks again for the article Connor.


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 8928 replies
  • April 21, 2023

Thanks Connor great article and I read alot about the NCR and it's issues. 💩


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Thank you Connor, keep up with the great articles.


russell.harris
Popular Voice
Forum|alt.badge.img+5

Cheers as always @ConnorM for sharing


Forum|alt.badge.img+1
  • New Member
  • 56 replies
  • April 22, 2023

Great article Connor


Robis
New Member
Forum|alt.badge.img+1
  • New Member
  • 74 replies
  • April 22, 2023

Thank You Connor for great article


tasystems
New Voice
Forum|alt.badge.img+8
  • New Voice
  • 156 replies
  • April 23, 2023

The PowerShell script side… thats scary… now… obvious question is… I assume Webroot will detect and deal with this?


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • April 23, 2023

@ConnorM  thank you for the article, send to my Sales guys to forward to our customers. 


kleinmat4103
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 512 replies
  • April 24, 2023

Thanks @ConnorM !

 

I’ve rarely had a good experience with Papercut. But I guess I’m always on the fix-it side of Papercut. Maybe it works better than I think. Well, unless someone is exploiting it to run scripts on your computer. Then it’s definitely not.