LoanDepot Compromised by ALPHV/BlackCat Ransomware

LoanDepot Compromised by ALPHV/BlackCat Ransomware

LoanDepot Compromised by ALPHV/BlackCat Ransomware

DOWNLOAD PDF

Overview

Between January 3-5, prolific Russian ransomware group ALPHV/BlackCat compromised LoanDepot, a California-based mortgage company, resulting in the exposure of sensitive data associated with approximately 17 million customers, including social security numbers, names, phone numbers, dates of birth, and financial account numbers. On January 4th, LoanDepot filed a SEC Form 8-K, a report filed to notify investors of major events, stating:

LoanDepot, Inc. (the “Company”) recently identified a cybersecurity incident affecting certain of the Company’s systems. Upon detecting unauthorized activity, the Company promptly took steps to contain and respond to the incident, including launching an investigation with assistance from leading cybersecurity experts, and began the process of notifying applicable regulators and law enforcement. Though our investigation is ongoing, at this time, the Company has determined that the unauthorized third party activity included access to certain Company systems and the encryption of data. In response, the Company shut down certain systems and continues to implement measures to secure its business operations, bring systems back online and respond to the incident. The Company will continue to assess the impact of the incident and whether the incident may have a material impact on the Company.

ALPHV/BlackCat claimed their negotiations with LoanDepot included a proposed six million dollar ransom.

Although unconfirmed, the group alleged that “LoanDepot employed ‘stalling tactics’ during negotiations and ultimately stopped  responding to the group. To date, the compromised LoanDepot data has not been publicly disclosed by ALPHV/BlackCat. The U.S. Department of State has issued a reward in the amount of up to $15 million for information leading to the identification or location of ALPHV/BlackCat leadership.

Outcomes

Adversarial groups, such as ALPHV/BlackCat, frequently target industries known for retaining vast quantities of sensitive personal information, including healthcare, financial, education, and local governments. Sensitive stolen information can be used to facilitate additional criminal activity, such as identity theft and highly targeted social engineering-enabled phishing attacks.

On February 28, 2024, it was announced that President Biden “will issue an executive order Wednesday seeking to restrict the sale of sensitive American data to China, Russia and four more countries [Iran, North Korea, Cuba, Venezuela], a first-of-its-kind attempt to keep personally identifying information from being obtained for blackmail, scams or other harm.

The restrictions will also include entities linked to the aforementioned countries. Restricting the sale of personal data to adversarial countries will likely result in a demand increase for data procured through criminal activity, such as ransomware and data exfiltration.

ALPHV/BlackCat Profile

ALPHV/BlackCat is a Russian ransomware-as-a-service (RaaS) group, established in approximately 2021, that gained international notoriety by using and providing affiliates with the infrastructure that allows operators to launch financially motivated attacks. According to the U.S. Department of Justice, ALPHV/BlackCat is responsible for financial losses in the hundreds of millions. In December 2023, ALPHV/BlackCat’s infrastructure was seized as the result of law enforcement action. According to CPO Magazine, “the FBI used a confidential human source to infiltrate the gang after offering rewards of up to $10 million for crucial information related to hacking groups targeting US critical infrastructure.”7 The FBI used the access to retrieve “946 keys used for hosting various communication channels, data leak sites, and affiliate panels. Subsequently, the federal law enforcement agency provided a free decryption tool to over 400 organizations victimized by the BlackCat cyber gang, including schools, healthcare, emergency services, and critical manufacturers.”

Following the seizure by law enforcement, ALPHV/BlackCat “has since ‘unseized’ their sites and switched a new Tor leak site that the FBI has not yet taken down. Additionally, likely in an effort to retain affiliates, ALPHV/BlackCat announced it would allow those affiliates to retain 90% of the ransoms paid as well as authoring a “rant” in Russian stating that previously “off-limits” targets, including hospitals and nuclear power facilities, may now be attacked.

Despite the statement, hospitals are a frequent target of ransomware attacks and previous limitations on the sector do not appear to have been enforced.

Tactics, Techniques, & Procedures (TTPs)

On February 27, 2024, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Human and Health Services (HHS) released an update to a joint advisory regarding ALPHV/BlackCat providing new indicators of compromise (IOCs) and TTPs associated with the group.

The following was directly lifted from the advisory.

  • ALPHVBlackcat affiliates use advanced social engineering techniques and open source research on a company to gain initial access. Actors pose as company IT and/or helpdesk staff and use phone calls or SMS messages [T1598] to obtain credentials from employees to access the target network [T1586]. ALPHV Blackcat affiliates use uniform resource locators (URLs) to live-chat with victims to convey demands and initiate processes to restore the victims’ encrypted files.
  • After gaining access to a victim network, ALPHV Blackcat affiliates deploy remote access software such as AnyDesk, Mega sync, and Splashtop in preparation of data exfiltration. ALPHV Blackcat affiliates create a user account, “aadmin,” and use Kerberos token generation for domain access [T1558]. After gaining access to networks, they use legitimate remote access and tunneling tools, such as Plink and Ngrok [S0508]. ALPHV Blackcat affiliates claim to use Brute Ratel C4 [S1063] and Cobalt Strike [S1054] as beacons to command and control servers. ALPHV Blackcat affiliates use the open source adversary-in-the middle attack [T1557] framework Evilginx2, which allows them to obtain multifactor authentication (MFA) credentials, login credentials, and session cookies. The actors also obtain passwords from the domain controller, local network, and deleted backup servers to move laterally throughout the network [T1555].
  • To evade detection, affiliates employ allowlisted applications such as Metasploit. Once installed on the domain controller, the logs are cleared on the exchange server. Then Mega.nz or Dropbox are used to move, exfiltrate, and/or download victim data. The ransomware is then deployed, and the ransom note is embedded as a file.txt. According to public reporting, affiliates have additionally used POORTRY and STONESTOP to terminate security processes.
  • Some ALPHV Blackcat affiliates exfiltrate data after gaining access and extort victims without deploying ransomware. After exfiltrating and/or encrypting data, ALPHV Blackcat affiliates communicate with victims via TOR [S0183], Tox, email, or encrypted applications. The threat actors then delete victim data from the victim’s system.
  • ALPHV Blackcat affiliates offer to provide unsolicited cyber remediation advice as an incentive for payment, offering to provide victims with “vulnerability reports” and “security recommendations” detailing how they penetrated the system and how to prevent future re-victimization upon receipt of ransom payment. The ALPHV Blackcat encryptor results in a file with the following naming convention: RECOVER-(seven-digit extension) FILES.txt.

Noteworthy Attacks & Victims

ALPHV/BlackCat ransomware has targeted an extensive list of victims representing various sectors, including manufacturing, healthcare, and transportation. According to a Reuters report, ALPHV/BlackCat was recently implicated in a ransomware attack targeting UnitedHealth Group subsidiary, Optum, resulting in outages of payment platforms at pharmacies across the U.S. Previous reports suggested the cyberattack originated from “suspected nation-state.”12 ALPHV/BlackCat did not respond to request from Reuters, when asked if they were responsible for the attacks.13 The following is a non-exhaustive list of ALPHV/BlackCat ransomware victims.

  • Prudential Financial: On February 5th, 2024, Prudential Financial filed a SEC Form 8-K disclosing a cyber attack resulting in unauthorized access to certain systems.14 ALPHV/BlackCat claimed responsibility for the attack.
  • Trans-Northern Pipelines: On February 14th, 2024, Trans-Northern Pipelines (TNPI), a major Canadian oil and gas pipeline operator, confirmed its internal network was breached in 2023. ALPHV/BlackCat claimed responsibility for the attack.
  • Fidelity National Financial (FNF): On January 9th, 2024, Fidelity National Financial confirmed in an SEC form 8-K filing that a cyberattack occurred on November 19, 2023, and confirmed hackers stole data on 1.3 million of its customers.17 FNF said it was “contained” seven days later on November 26, 2023. ALPHV/BlackCat claimed responsibility for the attack in a post on its dark web leak site.
  • Norton Healthcare: On December 8, 2023, Kentucky health system Norton Healthcare confirmed a ransomware attack in May 2023 that resulted in 2.3 million individuals’ data being exposed in the attack. The attack was claimed in May 2023 by ALPHV/BlackCat saying they allegedly stole 4.7TB of data from the healthcare system’s compromised systems.
  • Tipalti: On December 4th, 2023, Tipalti, a major accounting software company, confirmed it was investigating a ransomware attack claimed by ALPHV/BlackCat targeting the company and its customers Roblox and Twitch.
  • Henry Schein: On October 15th, 2023, Henry Schein, a major healthcare provider confirmed it was “forced to take some systems offline”23 to respond to a cyberattack that took place on October 14th. ALPHV/BlackCat added Henry Schein to its dark web leak site, saying it stole 35 terabytes of “sensitive data.”

References

1 https://www.scmagazine.com/news/loandepot-confirms-ssns-leaked-in-breach-claimed-by-alphv-blackcat

2 https://www.sec.gov/ixviewer/ix.html?doc=/Archives/edgar/data/0001831631/000183163124000004/ldi-20240104.htm

3 https://www.scmagazine.com/news/loandepot-confirms-ssns-leaked-in-breach-claimed-by-alphv-blackcat

4 https://www.state.gov/reward-for-information-alphv-blackcat-ransomware-as-a-service/

5 https://www.scmagazine.com/news/loandepot-confirms-ssns-leaked-in-breach-claimed-by-alphv-blackcat

6 https://www.nytimes.com/2024/02/28/technology/biden-data-sales-chinarussia.html#:~:text=President%20Biden%20will%20issue%20an,blackmail%2C%20scams%20or%20other%20harm.

7 https://www.cpomagazine.com/cyber-security/russian-ransomware-gang-alphv-blackcat-resurfaces-with-300gb-of-stolen-usmilitary-documents/

8 https://www.cpomagazine.com/cyber-security/russian-ransomware-gang-alphv-blackcat-resurfaces-with-300gb-of-stolen-usmilitary-documents/

9 https://www.bleepingcomputer.com/news/security/fbi-cisa-warn-us-hospitals-of-targeted-blackcat-ransomware-attacks/

10 https://www.cpomagazine.com/cyber-security/blackcat-ransomware-gang-recovers-from-early-december-law-enforcementoperation-restores-websites-seized-by-doj/

11 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a

12 https://techcrunch.com/2024/02/26/ransomware-attack-change-healthcare-prescription-pharmacy-outages

13 https://www.reuters.com/technology/cybersecurity/cyber-security-outage-change-healthcare-continues-sixth-straight-day-2024-02-26/

14 https://www.sec.gov/Archives/edgar/data/1137774/000119312524033753/d770643d8k.htm

15 https://www.theregister.com/2024/02/19/alphv_claims_cyberattacks_on_prudential/

16 https://www.bleepingcomputer.com/news/security/trans-northern-pipelines-investigating-alphv-ransomware-attack-claims/

17 https://www.bleepingcomputer.com/news/security/fidelity-national-financial-hackers-stole-data-of-13-million-people/

18 https://techcrunch.com/2024/01/09/fidelity-national-financial-data-breach

19 https://www.insurancebusinessmag.com/us/news/cyber/fidelity-national-financial-cyberattack–more-than-one-millionimpacted-472531.aspx#:~:text=The%20cyberattack%20that%20hit%20FNF,its%20dark%20web%20leak%20site.

20 https://apps.web.maine.gov/online/aeviewer/ME/40/0d29d7d3-48c2-4879-b6c7-32360396bd04.shtml

21 https://www.databreaches.net/norton-healthcare-didnt-call-it-a-ransomware-attack-then-blackcat-claimed-responsibility-for-it/

22 https://therecord.media/tipalti-alleged-ransomware-attack

23 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-breach-of-healthcare-giant-henry-schein/

24 https://cyware.com/news/healthcare-giant-henry-schein-hit-twice-by-blackcat-8457da45

Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations

The Federal Bureau of Investigation (FBI), National Security Agency (NSA), US Cyber Command, and international partners are releasing this joint Cybersecurity Advisory (CSA) to warn of Russian state-sponsored cyber actors’ use of compromised Ubiquiti EdgeRouters (EdgeRouters) to facilitate malicious cyber operations worldwide. The FBI, NSA, US Cyber Command, and international partners – including authorities from Belgium, Brazil, France, Germany, Latvia, Lithuania, Norway, Poland, South Korea, and the United Kingdom — assess the Russian General Staff Main Intelligence Directorate (GRU), 85th Main Special Service Center (GTsSS), also known as APT28, Fancy Bear, and Forest Blizzard (Strontium), have used compromised EdgeRouters globally to harvest credentials, collect NTLMv2 digests, proxy network traffic, and host spear-phishing landing pages and custom tools.

This advisory provides observed tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and recommendations to mitigate the threat posed by APT28 threat actors related to compromised EdgeRouters. Given the global popularity of EdgeRouters, the FBI and its international partners urge EdgeRouter network defenders and users to apply immediately the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of cybersecurity incidents associated with APT28 activity. Ubiquiti EdgeRouters have a user-friendly, Linux-based operating system that makes them popular for both consumers and malicious cyber actors. EdgeRouters are often shipped with default credentials and limited to no firewall protections to accommodate wireless internet service providers (WISPs). Additionally, EdgeRouters do not automatically update firmware unless a consumer configures them to do so.

DOWNLOAD THE FULL JOINT CYBERSECURITY ADVISORY

CSA_Russian APT28_022924

 

Blackswan CEO Mike Saylor Earns Doctor of Business Administration, Specializing in Computer and Information Systems Security

Blackswan CEO Mike Saylor Earns Doctor of Business Administration, Specializing in Computer and Information Systems Security

Blackswan CEO Mike Saylor Earns Doctor of Business Administration, Specializing in Computer and Information Systems Security

DrSaylor2024

Blackswan Cybersecurity is thrilled to announce the successful defense of Blackswan CEO Mike Saylor’s dissertation, earning him the distinction of Doctor of Business Administration, specializing in Computer and Information Systems Security.

Dr. Saylor’s dedication and hard work have culminated in a groundbreaking study that sheds light on crucial qualitative factors impacting the cybersecurity workforce deficit. His intention to share these invaluable insights with workforce working groups, including NICE, demonstrates his commitment to advancing the conversation around adequate workforce training and education.

Blackswan looks forward to the publication of Dr. Saylor’s study, which should contribute significantly to the greater cybersecurity community’s understanding of the challenges and solutions around workforce deficit. #cybersecurityjobs #cybersecurityworkforce #DrMikeSaylor #cybersecurity #congratulations

LoanDepot Compromised by ALPHV/BlackCat Ransomware

Akira Ransomware Exploiting Cisco ASA/FTD Bug (CVE-2020-3259)

Akira Ransomware Exploiting Cisco ASA/FTD Bug (CVE-2020-3259)

DOWNLOAD PDF

SUMMARY

CISA added CVE-2020-3259 to the Known Exploited Vulnerabilities catalog for a now-patched vulnerability affecting Cisco ASA and FTD software. The high-severity information disclosure issue could allow attackers to retrieve memory contents from affected devices. The Akira ransomware group appears to be exploiting this vulnerability to compromise Cisco Anyconnect SSL VPN appliances.

RISK SCORING

CVE-ID Score
CVE-2020-3259 7.5

 

TECHNICAL DETAILS

This is an information disclosure vulnerability found in the web services interface of Cisco’s Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) products. It allows a remote, unauthenticated attacker to extract potentially sensitive data from an affected device’s memory, including credentials. Although Cisco patched the flaw in 2020, it gained attention recently when Truesec discovered evidence suggesting exploitation by the Akira ransomware group.

Truesec’s analysis of a recent incident response engagement, where Akira ransomware was involved and Cisco Anyconnect SSL VPN was the entry point, revealed that at least six compromised devices were running different versions of the vulnerable software.

AFFECTED PRODUCTS

Cisco Adaptive Security Appliance (ASA):

  • Cisco ASA 9.x prior to release 9.51
  • Cisco ASA 9.6 prior to release 9.6.4.41
  • Cisco ASA 9.7 prior to release 9.71
  • Cisco ASA 9.8 prior to release 9.8.4.20
  • Cisco ASA 9.9 prior to release 9.9.2.67
  • Cisco ASA 9.10 prior to release 9.10.1.40
  • Cisco ASA 9.12 prior to release 9.12.3.9
  • Cisco ASA 9.13 prior to release 9.13.1.10

Cisco Firepower Threat Defense (FTD):

  • Cisco FTD 6,x prior to release 6.2.31
  • Cisco FTD 6.2.3 prior to release 6.2.3.16
  • Cisco FTD 6.3.0 prior to release 6.3.0.6
  • Cisco FTD 6.4.0 prior to release 6.4.0.9
  • Cisco FTD 6.5.0 prior to release 6.5.0.5

SOLUTION

Update Cisco Adaptive Security Appliance (ASA) to the respective release, as follows:

  • Cisco ASA release 9.51
  • Cisco ASA release 9.6.4.41
  • Cisco ASA release 9.71
  • Cisco ASA release 9.8.4.20
  • Cisco ASA release 9.9.2.67
  • Cisco ASA release 9.10.1.40
  • Cisco ASA release 9.12.3.9
  • Cisco ASA release 9.13.1.10

Updated Cisco Firepower Threat Defense (FTD) to the respective release, as follows:

  • Cisco FTD release 6.2.31
  • Cisco FTD release 6.2.3.16
  • Cisco FTD release 6.3.0.6
  • Cisco FTD release 6.4.0.9
  • Cisco FTD release 6.5.0.5

MITIGATIONS

  • Upgrade to the latest available version for ASA / FTD.
  • For devices that are managed using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy.
  • For devices that are managed using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy.
  • Implement MFA on all accounts and services where it is possible, especially for Client VPN connections.
  • Force a password change, especially if there are accounts in the environment that were not changed after the version upgrade.
  • Change secret and pre-shared keys in device configurations if not changed after the version upgrade.

REFERENCES

 

LoanDepot Compromised by ALPHV/BlackCat Ransomware

CISA Releases Seventeen Industrial Control Systems Advisories

CISA Releases Seventeen Industrial Control Systems Advisories

DOWNLOAD PDF

Summary

CISA released seventeen Industrial Control Systems (ICS) advisories on February 15, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

CISA encourages users and administrators to review the newly released ICS advisories (linked above) for technical details and mitigations.