{"id":18360,"date":"2022-02-24T14:11:10","date_gmt":"2022-02-24T22:11:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/24\/news-12093\/"},"modified":"2022-02-24T14:11:10","modified_gmt":"2022-02-24T22:11:10","slug":"news-12093","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/24\/news-12093\/","title":{"rendered":"Cyclops Blink malware: US and UK authorities issue alert"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 24 Feb 2022 15:38:34 +0000<\/strong><\/p>\n<p>According to a joint security advisory published yesterday by US and UK cybersecurity and law enforcement agencies, a new malware called Cyclops Blink has surfaced to replace the VPNFilter malware attributed to the Sandworm group, which has always been seen as a Russian state-sponsored group.<\/p>\n<h2>Cyclops Blink<\/h2>\n<p>The <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-054a\" rel=\"nofollow\">alert issued b<\/a><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-054a\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">y the Cybersecurity &amp; Infrastructure Security Agency<\/a> (CISA) and an <a href=\"https:\/\/www.ncsc.gov.uk\/files\/Cyclops-Blink-Malware-Analysis-Report.pdf\">analysis <\/a><a href=\"https:\/\/www.ncsc.gov.uk\/files\/Cyclops-Blink-Malware-Analysis-Report.pdf\" rel=\"noreferrer noopener nofollow\" target=\"_blank\">published<\/a><a href=\"https:\/\/www.ncsc.gov.uk\/files\/Cyclops-Blink-Malware-Analysis-Report.pdf\"> by the UK\u2019s National Cyber Security Center<\/a> (NCSC) show Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) for this new malware.<\/p>\n<p>Cyclops Blink has primarily been deployed to networking hardware company WatchGuard&#8217;s devices. <a href=\"https:\/\/www.watchguard.com\/wgrd-news\/blog\/important-detection-and-remediation-actions-cyclops-blink-state-sponsored-botnet\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">According to WatchGuard<\/a>, Cyclops Blink may have affected approximately 1% of active firewall appliances, which are devices mainly used by business customers.<\/p>\n<p>Cyclops Blink has been found in WatchGuard&#8217;s firewall devices since at least June 2019. But the NCSC warns that it is likely that Sandworm is capable of compiling the same or very similar malware for other architectures and firmware. The attackers were able to infect their devices via a WatchGuard vulnerability that was patched in a May 2021 update.<\/p>\n<p>The analysis says Cyclops Blink malware also comes with modules specifically developed to upload\/download files to and from its command and control server, collect and exfiltrate device information, and update the malware. The presence of a Cyclops Blink infection does not mean that an organization is the primary target, but its machines could be used to conduct attacks on others. Either way, it is in your best interest to disconnect and remediate any affected devices.<\/p>\n<h2>Sandworm<\/h2>\n<p>In light of world news, it&#8217;s important to note that the Sandworm group has been known to target Ukrainian companies and government agencies. They were held responsible for destroying entire Ukrainian networks, triggering blackouts by targeting electrical utilities in the Ukraine (BlackEnergy malware), and releasing the NotPetya malware. <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/keeping-up-with-the-petyas-demystifying-the-malware-family\/\">NotPetya<\/a> is the name given to a later version of the Petya malware that began spreading rapidly, with infection sites focused in Ukraine, but from there it also spread across Europe and beyond.<\/p>\n<p>Among the latest attacks on Ukraine was a <a href=\"https:\/\/www.malwarebytes.com\/ddos\">distributed denial of service (DDoS) attack<\/a>. Cyberattacks, such as DDoS attacks, fall under the traditional categories of sabotage, espionage and subversion. So far, we can see the results of these attacks as several of Ukraine\u2019s bank and government department websites crashed, and earlier this week some 70 Ukrainian government websites underwent the same fate.<\/p>\n<p>As we learned from NotPetya, these attacks can spread around the world. NotPetya affected computer networks worldwide, targeting hospitals and medical facilities in the United States, and costing more than US$1 billion in losses.<\/p>\n<h2>VPNFilter<\/h2>\n<p>CISA and the NCSC both describe the Cyclops Blink malware as a successor to an earlier Sandworm tool known as <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/vpnfilter-malware-still-making-waves\/\">VPNFilter<\/a>, which infected half a million routers to form a global botnet before it was identified by Cisco and the FBI in 2018 and largely dismantled. It never fully disappeared, and the Sandworm group has since shown limited interest in existing VPNFilter footholds, instead preferring to retool.<\/p>\n<p>VPNFilter was deployed in stages, with most functionality in the third-stage modules. These modules enabled traffic manipulation, destruction of the infected host device, and likely enabled downstream devices to be exploited.<\/p>\n<h2>Mitigation and detection<\/h2>\n<p>WatchGuard firewall appliances are not at risk if they were never configured to allow unrestricted management access from the Internet which is the default setting for all WatchGuard\u2019s physical firewall appliances. Internet access to the management interface of any device is a security risk.<\/p>\n<p>All WatchGuard appliances should be updated to the latest version of <a href=\"https:\/\/www.watchguard.com\/help\/docs\/help-center\/en-US\/Content\/en-US\/Fireware\/installation\/version_upgrade_new_c.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Fireware OS<\/a>.<\/p>\n<p>When it comes to infected appliances, Cyclops Blink persists on reboot and throughout the legitimate firmware update process. So, affected organizations should take steps to remove the malware. WatchGuard customers and partners can eliminate the potential threat posed by malicious activity from the botnet by immediately enacting <a href=\"https:\/\/detection.watchguard.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">WatchGuard\u2019s 4-Step Cyclops Blink Diagnosis and Remediation Plan<\/a>.<\/p>\n<p>Owners of infected appliances will also need to update the passphrases for the Status and Admin device management accounts and replace any other secrets, credentials, and passphrases configured on the appliance. All accounts on infected devices should be assumed to be compromised.<\/p>\n<p>Heightened awareness of Cyclops Blink and other malware attacks that may be aimed at the Ukraine is required. This is true for everyone involved in cybersecurity by the way, not just owners of WatchGuard appliances.<\/p>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2022\/02\/cyclops-blink-malware-us-and-uk-authorities-issue-alert\/\">Cyclops Blink malware: US and UK authorities issue alert<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2022\/02\/cyclops-blink-malware-us-and-uk-authorities-issue-alert\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 24 Feb 2022 15:38:34 +0000<\/strong><\/p>\n<p>US and UK authorities have attributed the newly found malware Cyclops Blink to the Russian state-sponsored Sandworm group.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2022\/02\/cyclops-blink-malware-us-and-uk-authorities-issue-alert\/\">Cyclops Blink malware: US and UK authorities issue alert<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[23583,25116,19507,23135,12830,20432,21161,25117,8642,18514,25118],"class_list":["post-18360","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cisa","tag-cyclops-blink","tag-ioc","tag-ncsc","tag-notpetya","tag-sandworm","tag-threat-spotlight","tag-ttp","tag-ukraine","tag-vpnfilter","tag-watchguard"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18360"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18360\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18360"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}