MVISION Insights: Nobelium threat group targeted government and business entities
Technical Articles ID:
KB95237
Last Modified: 1/25/2022
Last Modified: 1/25/2022
MVISION Insights: Nobelium threat group targeted government and business entities
Technical Articles ID:
KB95237
Last Modified: 1/25/2022 Environment
IMPORTANT: This Knowledge Base article discusses a specific threat that is being automatically tracked by MVISION Insights technology. The content is intended for use by MVISION Insights users, but is provided for general knowledge to all customers. Contact us for more information about MVISION Insights.
SummaryThe Nobelium threat group targeted multiple sectors around the world. The group possibly used information stealing malware obtained from a third-party actor for initial access. The CEELOADER downloader and multiple Cobalt Strike beacons along with valid accounts were used to steal sensitive mail data. Communication with compromised victims was carried out using residential IP proxy services and newly provisioned geo located infrastructure. To determine internal configurations and identify devices, the actor extracted virtual machines from the infected network. The McAfee Enterprise ATR Team gathers and analyzes information from multiple open and closed sources before disseminating intelligence reports. This campaign was researched by Mandiant and shared publicly here. How to use this article:
This Knowledge Base article discusses a specific threat that is being tracked. The list of IOCs will change over time; check MVISION Insights for the latest IOCs. Campaign IOC
Minimum set of Manual Rules to improve protection to block this campaign IMPORTANT: Always follow best practices when you enable new rules and signatures. When you implement new rules or signatures, always set them to Report mode first and check the alerts generated. Resolve any issues that arise and then set the rules to Block. This step mitigates against triggering false positives and allows you to refine your configuration. For more information, see KB87843 - List of and best practices for Endpoint Security Dynamic Application Containment rules. Endpoint Security - Advanced Threat Protection: Rule ID: 5 Use GTI URL reputation to identify trusted or malicious processes
Affected Products |
|