S21sec Threat Landscape Report 2022 1 EN
S21sec Threat Landscape Report 2022 1 EN
During the first half of 2022, we have identified a significant number of cyber
threats that have posed a high risk to public and private entities, which have been
affected to a lesser or greater extent by the exploitation of critical vulnerabilities,
ransomware cyberattacks, distribution of destructive malware or data breaches.
10. Telco
11. Smartphones
12. APT
1000
At the end of March, a zero-day vulnerability,
known as Spring4Shell or SpringShell, marked 500
the security threat landscape as it was linked to
a remote code execution (RCE) vulnerability in 0
JAN FEB MAR APR MAY JUN
the Java Spring web application development
environment.
46 175
Tvos Windows RT 8.1
T H R E AT L A N D S C A P E R E P O R T First semester 2022
LOG4SHELL
EXPLOIT
In June, the U.S. Cybersecurity and Infrastructure Agency (CISA) warned of active exploitation of
the Log4Shell vulnerability (CVE-2021-44228) in unpatched VMware Horizon and Unified Access
Gateway Servers.
D O GWA L K
in June, Microsoft patched a zero-day Windows vulnerability in the Microsoft Support Diagnostic
Tool (MSDT) through the 0patch platform.
SOPHOS
During the first half of 2022, security researchers have reported the active exploitation of a critical
vulnerability (CVE-2022-1040) in Sophos Firewall to target a set of organizations in South Asia.
RA N S O M WA R E S TAT I C S
R A N S O M WA R E FA M I L I E S
Overall, the three most active ransomware groups during this period were LockBit, Conti and Blac-
kCat (ALPHV), which encrypted a total of 517, 214 and 123 victims respectively, according to the
attacks analyzed.
During this first semester, a total of 41 different families of ransomware have been observed.
In general terms, it is worth noting the trend toward the appearance of new ransomware groups in
the threat landscape, including Pandora, Night Sky, Haron, Black Basta, Mindware, Cheers, Industrial
Spy, Crimson Walrus, and Axxes.
In addition to the activation of the well-known REVil3.0 ransomware group, which has shown signs
of activity since March, following the arrest in January of several of its members and the cessation
of its infrastructure.
Other threat groups have ceased operations, such as the Conti ransomware which, after declaring
its support for Russia in February this year, suffered a leak by one of its members, known as ContiLeaks,
which released the group's internal records and has allowed researchers to reveal the ransomware's
workings, operations, victims, code, etc.
TO P 7 M O ST ACT I V E
517
M A LWA R E FA M I L I ES D U R I N G
T H E F I R ST H A L F O F 2 0 2 2
214
123
73 64 54
36
RA N S O M WA R E S TAT I C S
CO U N T R I E S
S21sec's Threat Intelligence team has monitored the activity carried out by threat actors on more
than 50 ransomware group blogs on the Deep Web, Dark Web, and underground forums. It should
be noted that the observed number of attacks covers only the observed public activity carried out
by threat actors.
With a total of 1.466 attacks worldwide during the first half of 2022, the most affected continent is
North America, with a total of 689 attacks, followed by Europe with 485, and Asia, which has suffered
161 attacks during this period of time.
Focusing on the countries, the United States registers the highest number with 604 attacks,
followed by Germany and the United Kingdom, with 90 and 86.
Spain has received 34 attacks during the first half of 2022 and Portugal, 5, placing them in position
7 and 37 in the world ranking of cyber attacks, respectively.
90
604 86
5
37
T H R E AT L A N D S C A P E R E P O R T First semester 2022
RA N S O M WA R E S TAT I C S
S EC TO R S
The results show a total of 1,466 ransomware attacks registered between January and June 2022.
As for the verticals of the most prominent industries to which the 1,466 victims of these ransomware
belong, they are mainly companies in the technological, industrial, retail, and construction.
The previous ones have been highlighted for exceeding 90 victims in this period; however, other
sectors such as health, transport and logistics, government and administration and finance,
exceed 70 victims as a whole.
TO P 5 S EC TO R S M O S T A F F EC T E D BY R A N S O M WA R E D U R I N G T H E
FIRST HALF OF 2022
200
160
143
150
117
95
100 88
50
0
Construction Industrial Retail Healthcare Tecnological
T H R E AT L A N D S C A P E R E P O R T First semester 2022
THREATS
In this case, before Russia entered
Ukraine, cyberattacks were using
destructive malware against The threat landscape arising from the war in
Ukraine is broad and includes :
Ukrainian organizations and critical
- Destructive malware attacks.
infrastructure, the so-called wipers. - Ransomware.
- Phishing campaigns.
- Malspam.
- Hacktivist attacks.
Such destructive attacks are carried
out by government-sponsored APT DESTRUCTIVE MALWARE
(advanced persistent threat) groups
ATTACKS
with high technical capabilities.
During the conflict, the use by Russia of different
Due to the Russian threat in cyberspace, types of wiper-type malware has been observed,
the Ukrainian government conducted the main objective of which is to destroy the
massive recruitment of computer targeted systems or the deletion of data within
security experts that involved the them, causing great damage to the affected
participation of hackers worldwide. companies and organizations.
These cyber volunteers joined an The first wiper observed in the context of the war
army called the IT Army of Ukraine. was the so-called Whispergate, on January 13,
2022, before the invasion. Subsequently, on
February 24, Russian attackers launched the
In this cyber conflict, individual actors,
IsaacWiper malware. On March 14, an attack with
pro-Russian or pro-Ukrainian hacktivist CaddyWiper was observed.
groups have been involved in
conducting cyberattacks against In addition, other malware known as Hermetic
the opposing side. Wiper, HermeticWizard, and HermeticRansom
were also observed.
It is also noteworthy that the scope of
the attacks has extended to other In March, DoubleZero and Cyclops Blink malware
countries and international organizations were also detected.
that are not actively participating in the
armed conflict. Subsequently, in mid-April, a large-scale cyberattack
was reported against power substations of a
Ukrainian energy company, which used a new
variant of the Industroyer malware deployed by
Russia in Ukraine in 2016, known as Industroyer2.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
HACKTIVISM
In this conflict, there has been a reactivation Poland, Romania, Ukraine, the United
of international hacktivism, with Anonymous States, the Czech Republic, among others.
as one of the most relevant actors in this
category. It should be noted that in mid-May, Killnet
published a threat directed at Italy and
Anonymous showed its support for Ukraine Spain through its Telegram channel, after
from the beginning of the conflict, carrying which they carried out numerous Denial of
out a large number of attacks based on Service attacks on Italian sites.
defacements of websites, DDoS attacks,
and leaks of databases and confidential
information of government agencies and
companies in various sectors.
The detection of new distribution operations of these banking Trojans reflects the prevalence of
these malicious codes, which have remained active and have been distributed throughout the first
half of 2022 using new templates and themes in their fraudulent communications, impersonating
various services, companies, and organizations and making use of new artifacts that facilitate their
distribution.
GRANDOREIRO
The Grandoreiro trojan has become a relevant threat in the banking sector in Spain and several
European Union countries since 2021. As a trojan, this malware is designed to have multiple
utilities. The most common is to create a backdoor in the infected computer to download
updates and new functionalities.
Among its characteristics, the speed with Distribution takes place via fraudulent
which its authors update their code stands e-mails containing a URL to a malicious
out, with different variants that have spread page or an attachment.
internationally since 2019 and have affected
banks in Spain, Mexico, and Portugal.
Iced ID
IcedID, also known as BokBot, is a banking trojan that appeared in 2017. This malware has different
capabilities, such as stealing personal information and credentials.
Operated by the APT by Luna Spider, also Less than 20 minutes after the initial infection, the
known as Gold Swathme, this malware has host executes remote PowerShell commands to
been used as a means of distribution in REvil/ deploy Cobalt Strike.
Sodinokibi ransomware campaigns. This link to
ransomware operations, in addition to its expo- In March, the use of compromised Microsoft
nential distribution in 2021, has led the expert Exchange servers for the distribution of malspam
community to suggest that this malware may designed to infect computers with IcedID was
act as a successor to Emotet in its mass infec- also detected. This operation targeted organi-
tion campaigns. zations in the energy, healthcare, legal and
pharmaceutical sectors.
Its means of distribution include phishing
operations through which malware operators The distribution made use of outdated servers,
send victims phishing e-mails containing a which allowed the criminals to exploit ProxyShell
malicious Microsoft attachment with Macros vulnerabilities to take over computers and
4.0 (XML), which leads to a second phase to send malspam with the IcedID code.
download the malware after opening the
document and enabling the macros. IN ADDITION TO THESE
INFECTIONS, AT THE END OF
In addition to this means, distribution has been
detected through the sending of contact forms. MAY WERE DETECTED
This means of infection allows attackers to
perform tracking activities, as well as move
laterally across affected networks to continue New distribution and infection vectors were
distributing additional malicious code. detected at the end of May, involving the use
of a ZIP archive containing an embedded .lnk
In February, new IcedID activity was detected (Microsoft Windows shortcut file) file that
linked to the loading of Cobalt Strike within a used the legitimate mshta.exe binary to
short time of just 20 minutes after infection. In
download IcedID to the target computer.
this operation, once executed, IcedID applies
discovery commands to capture system,
domain, and network information.
This operation also made use of DarkVNC, a
These are common commands executed by malicious distribution of the VNC (Virtual
precursor malware and are likely used to prioritize Network Computing) program that allowed
footholds for future intrusion actions. the malware to remotely control a victim's
computer.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
In the first half of 2022, there have been cyberattacks of various kinds against
companies in the energy sector. It should be noted that a country's energy
infrastructures are considered critical infrastructures, and an attack against
them can pose risks not only for the company attacked but also for the public.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
As mentioned above, during this period there have been attacks against companies in the energy
sector by actors with different objectives. Some of them sought financial gain, while others were
aimed at destroying or paralyzing electrical infrastructures to cause the greatest possible
damage.
Among
De entrethe
losmost
ataques
significant
más significativos
attacks during
durante
this period
este período
were
destacan
those thatlos
occurred
ocurridos
in February.
en febrero.
El sector fue víctima de una serie de ciberataques dirigidos a las empresas alemanas
The sector was the victim of a series of cyberattacks targeting the German companies
Oiltanking GmbH y Mabanaft GmbH y la compañía belga Sea-Invest, a los cuales se
Oiltanking GmbH and Mabanaft GmbH and the Belgian company Sea-Invest, to
le sumaron otra serie de ataques dirigidos a infraestructuras críticas, como el ataque
which were added another series of attacks targeting critical infrastructure, such as
ransomware sufrido por el grupo italiano Dolomiti Energia que dejó inoperativo sus
the ransomware attack suffered by the Italian group Dolomiti Energia that rendered
sistemas de TI o la compañía de servicios de aviación con sede en Suiza, Swissport
its IT systems inoperative or the Swiss-based aviation services company Swissport
International.
International.
Los ataques tuvieron como objetivo empresas de la cadena de suministro, proveedo-
The attacks targeted companies in the supply chain, suppliers, facilities, or systems,
res, instalaciones o sistemas, por parte de actores de amenazas con motivaciones
by primarily financially motivated threat actors.
principalmente económicas.
In early March, Rompetrol, a Romanian oil company operating in Europe, Central Asia,
and North Africa, specialized in the refining of petrochemical products, was the victim
of a ransomware attack by Hive operators, impacting most IT services.
Another company mentioned by the Hive ransomware during March has been Pan
American Energy S.L., Argentinian Branch, the country's main gas producer. So far no
company information has been leaked. In addition to the company Noble Oil, a privately
held used motor oil, antifreeze, and filter recycling services company located in the
United States.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
Since the beginning of the war conflict following Russia's invasion of Ukraine, the cyber
threat landscape targeting the strategic sector and critical infrastructure has been increasing,
and threat actors have been expanding their targets to other European countries, especially
those that have provided support to Ukraine.
Some cybercriminal groups have pledged support for both Ukraine and the Russian
government. In the case of Russian-aligned cyber actors, they have threatened to conduct
operations in cyberspace in retaliation for alleged cyber offensives against the Russian
government or the Russian people, in addition to cyber operations directed against countries
and organizations that provide support to Ukraine.
The vast majority of attacks observed during the development of hybrid warfare are
hacktivist motivated and consist of website defacements, DDoS and DoS attacks, and
leaks of databases and confidential information from government agencies and critical
infrastructure such as airports.
In this context, 43 ransomware attacks against companies in the energy sector have been
observed during the months of January to February 2022.
February saw three cyberattacks on European companies involved in wind power generation
by ransomware groups that have declared themselves to be aligned with the Russian
government, such as Conti or Black Basta. These attacks occurred in the initial phase of the
conflict between Russia and Ukraine and, although the incentive behind these groups is
generally economic, it cannot be ruled out that they may also have had political motivations,
to disrupt the operation of power generation companies in Europe.
Also, at the beginning of the conflict, the Blackcat ransomware, linked to cybercriminal
groups of Russian origin, targeted companies involved in oil and gas production and
transportation.
Malspam campaigns
On the other hand, the sector has been affected by malspam campaigns, in which threat actors
were distributing the Formbook malware, targeting oil and gas companies, by sending malicious
e-mails impersonating Saudi Arabia's state-owned oil and natural gas company, Saudi Aramco,
containing malicious PDF and Excel files containing the Formbook malware.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
B L AC KCAT
The Blackcat ransomware, also known as ALPHV, started its activity in November 2021, being
distributed via e-mail. When the victim downloads and opens the file attached to these emails, the
malware starts executing on the machine.
The widespread use of industrial control systems (ICS), from manufacturing and processing facilities
to power plants, has made this technology one of the targets for threat actors to impact large and
strategically positioned organizations.
Over the past few months, campaigns, tools, malicious code, and tactics have been uncovered to
target these systems and create major disruptions to the organizations that use them.
INCONTROLLER I N D U S T R OY E R 2
T H R E AT L A N D S C A P E R E P O R T First semester 2022
I N CO N T R O L L E R
During this period, several toolkits called Pipedream or Incontroller have been discovered, which
allow full system access to multiple Industrial Control System (ICS) devices.
Last April, the Cybersecurity and Infrastructure which allow access to Schneider Electric
Security Agency (CISA), the National Security programmable logic controllers (PLCs),
Agency (NSA), the Federal Bureau of Investigation OMRON Sysmac NEX PLCs, and open platform
(FBI), and the Department of Energy (DOE) communications unified architecture (OPC UA)
issued a joint cybersecurity advisory warning of servers.
threats backed by a government or advanced
persistent threat (APT) actors, using these tools,
With these tools, threat actors can perform lateral movement, privilege escalation,
and service disruption after gaining full access to ICS/SCADA device environments.
I N D U S T R OY E R 2
In April, a Ukrainian CERT investigation into a large-scale cyberattack against power substations of a
Ukrainian energy company that reportedly took place during the same month was made public,
which could be attributed to the Russian-origin APT known as Sandworm.
In this case, the malware only makes use of the Deployment of the CaddyWiper
IEC-104 protocol through which it communicates malware on Windows, Linux,
with the industrial equipment. and Solaris systems of the
target energy provider.
After connecting to the targeted devices and
computer equipment, the malware starts
adding the .MZ extension to the applications
The Sandworm group
used in the daily operations of the affected
initiates the sequence for the
computers and devices.
deployment of the Industroyer2
After this process, Industroyer2 could malware to cut off the electricity
access the control of ICS systems for a variety supply in a region of Ukraine.
of purposes, such as cutting off the power
supply.
Subsequent execution of the
CaddyWiper malware on the
same machines affected by
Industroyer2 to eliminate
traces of the latter.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
Since the start of the COVID-19 pandemic in 2020, the healthcare sector
(including hospitals, medical research centers, private clinics, and health
centers) has positioned itself as one of the main targets of cyberattacks,
highlighting the sensitivity of this sector to cyberattack threats.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
Previous editions of the S21sec Threat Landscape have mentioned the cyberthreats to which the
healthcare sector has been exposed and proposed future scenarios around this situation.
Among the cyberthreats shown in the document, ransomware attacks and phishing campaigns
for credential theft are the most common, which continue to be a cyberthreat with serious
repercussions.
However, with the beginning of the year 2022, 2 cyberthreats have been identified
whose notoriety has increased and have attracted attention:
In the case of data breaches, these usually occur after a previous cyberattack, either by
phishing campaigns, intrusion, ransomware, or infection by other malware. In addition,
threat actors can perform mere intrusion actions to collect information/data to use it for
malicious purposes.
According to data compiled by S21sec, data breaches are considered to be among the main
cyber threats against hospitals, clinics, and private clinics of any specialty, among others.
With this, S21sec has been able to identify more than 50 data breaches in the first half of
2022.
However, the number of these could be higher, doubling the figure of 50, while some of them
have not been identified due to 2 main casuistry:
several clinics do not report the data breach to the relevant agencies due to ignorance of it
or for reasons of reputational damage.
Cybercriminals responsible for the data breach do not announce in blogs and underground
forums the sale or exposure of the stolen data, being unknown without a previous computer
analysis if it has been the victim of an intrusion and data theft.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
For example, in the first 6 months of 2022, the data breaches of the Hospital Centro de Andalucía,
which reported a data breach following a cyberattack last January.
The US hospital group Shields Health Care, which suffered a data breach in early June that affected
more than 2 million patients following a cyberattack that occurred in March, having a significant
impact on its infrastructure and patient and employee data, can be highlighted.
In this region, the sector provides 18 million direct jobs and contributes around 9% of the
EU's GDP.
This makes the construction sector one of the main targets of cybercriminal groups, especially
ransomware groups looking for financial gain, and APT groups aimed at cyber espionage.
R A N S O M WA R E
One of the main threats against the construction sector has been the danger posed by ransomware
attacks. During the last six months, the construction sector has been one of the sectors most
impacted by this type of attack, accounting for 95 of the total number of attacks recorded.
Among the most active ransomware groups targeting organizations in the industry are the
following:
CY B E R E S P I O N AG E
Concerning cyberespionage campaigns targeting the construction sector, the main
cybersecurity risk for organizations in the industry is posed by APT campaigns.
These attacks are characterized by the use of a wide range of advanced techniques designed to
steal confidential information from organizations.
Tracking APT campaigns against the sector shows the growing interest of Chinese-sponsored
threat actors against organizations in the sector. APT campaigns stand out:
01 02 03
AP T2 0 A PT24 APT31
Also known as Twivy, Also known as PittyTiger, This Chinese
exploits the compromise it targets organizations in cyberespionage actor is
of strategic websites by countries such as the US focused on obtaining
party-hosted websites that and Taiwan. It exploits the information that can provide
address issues such as RAR archive utility to the government and
democracy, human rights, encrypt and compress state-owned companies
press freedom, ethnic stolen data before with political, economic, and
minorities in China, and transferring it outside the military advantages. APT31
other topics. network. The data theft has exploited vulnerabilities
extracted from this actor in applications such as Java
focuses on documents and Adobe Flash to
with strategic importance, compromise victims'
suggesting that it is environments.
intended to monitor the
movements of various
states on issues applicable
to China's ongoing
territorial or sovereignty
dispute.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
This key role has made industry organizations one of the main cyberattack targets for threat
actors, state-sponsored cyber actors, cybercriminals, and hacktivists seeking visibility.
In the first half of 2022, this sector has experienced an increase in the number of cyber
threats, malicious activities, and incidents against its IT systems. Some of the main incidents
against media and audiovisual industry have been:
RA N S O M WA R E AT TAC K S BY AT TAC K S BY
AT TAC K S CY B E R C R I M E H AC K T I V I S T
GROUPS GROUPS
RA N S O M WA R E AT TAC K S
Ransomware attacks against the media industry have increased exponentially during the
first half of the year, with international incidents such as the attack against Nikkei in May.
Different ransomware groups have been behind these attacks, including identified
groups such as Everest or Conti, which have leaked information on their victims.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
AT TAC K S BY CY B E R C R I M E G R O U P S
Cybercrime groups have also been at the forefront of attacks against media outlets in the
first half of the year, with significant attacks.
In January this year, the Portuguese media group Impresa, owner of the SIC television
channel and the Expresso newspaper, was the victim of a cyberattack by the Lapsus$
group, in which the cybercriminals allegedly obtained private information that they
would leak if they did not receive a ransom.
AT TAC K S BY H AC K T I V I S T G R O U P S
In the first half of the year, the media industry has been one of the main targets of attacks
by hacktivist groups, especially in the context of the Russian invasion of Ukraine.
Both Russian and Ukrainian media have been victims of organized hacktivist groups that
have used attacks for a wide range of politically motivated activities: disrupting services,
distributing fraudulent or propagandistic content, or stealing information.
From intrusion and sabotage attacks to defacement activities, the media of countries
involved in armed conflict have become targets of these collectives.
Some of the most relevant attacks include the hacking of the Russian television and
video content provider RuTube or the all-Russian state television and radio broadcasting
company VGTRK.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
In May, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal
Bureau of Investigation (FBI) made public the attribution of several cyberattacks that
occurred at the end of February against commercial satellite communication networks to
Russian state-sponsored threat actors.
It should be noted that malware targeting cell phone users is distributed mainly via four routes:
These messages include Many cases have been Numerous applications Although theses official
a link to a fraudulent observed in which appear in these markets app markets have internal
page where the user will cybercriminals urge to that look legitimate or security measures in
be asked for personal install fake updates of even a copy of the real place to prevent apps with
information to steal common software, such application but to which malicious code from
credentials, or a URL as Adobe Flash Player or the actors have added being available for
that directs to a page anti-virus. malicious code. download, there are still
where malware will be cases where an app that
downloaded. looks legitimate is an app
that contains some type
of malware.
P EG A S U S
The Pegasus spyware, developed by the Israeli security company NSO Group, has gained
prominence in the last three years for its use against members of state and regional governments,
as well as journalists, prominent citizens, and diplomatic personnel. The purpose of this
malware is espionage.
The exploitation of the three vulnerabilities attack has been performed, the spyware
allowed the attackers to infect the device when package is automatically installed.
the user accessed the URL previously sent by
the attackers through a smishing attack. These After installation, the spyware compromises
messages, sent either as SMS or as a message applications previously installed by the user
on social networks, used airline and public to collect information and data.
institution advertisements as lures.
Through the hooking technique, Pegasus
Once the user accesses the malicious URL, the can modify the behavior of applications and
malware performs actions to execute the operating systems.
exploits and proceeds to perform a jailbreak
For this infection, the attackers use zero-click exploits and exploit vulnerabilities in
the CoreGraphics PDF parser.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
XENOMORPH
Xenomorph is an Android banking trojan first discovered in February 2022, distributed under
the name FastCleaner application.
Upon installation of the application, the user is complete and the user has enabled accessibility
prompted with a window asking them to give services, the application appears to have no
accessibility service permissions to the application. behavior. If a user attempts to open the
The accessibility services permission should application, it simply returns the user to the
only be used to assist in the development of home screen, and, if the user attempts to
applications for users with disabilities. uninstall the application, the pop-up window
to confirm whether the user wants to uninstall
When the FastCleaner installation is finally it closes automatically.
As with other Android banking Trojans, when the user opens their banking app, the
Xenomorph malware will perform an overlay attack, superimposing a fake page that
impersonates the bank's login page, to get victims to enter their login keys.
The cybercriminals will use these passwords to access the account and steal
money.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
F LU B OT
Discovered in December 2020 and with a significant expansion in the last two years, FluBot was
distributed via SMS text messages, impersonating different entities to spread malicious links
where malware was downloaded as fake tracking programs for parcel deliveries or other services.
FluBot operators use SMS messages that Once downloaded, the application prompts
claim to contain links to voicemail, missed victims for certain permissions, such as accessing
call notifications, or alerts about incoming SMS data, managing phone calls, and reading
money from an unknown financial transaction. the user's address book.
The links in these messages take the victim to a Threat actors use the victim's contact list to
website that hosts the FluBot APK, which send an SMS with a message containing a
victims must download and install to learn the malicious link.
details of the transaction.
Because these messages come from a known
source, recipients are more likely to open them
and infect their devices.
Last May, the infrastructure behind FluBot was disabled by the Dutch police
and in early June Europol announced the complete removal of the FluBot
Android malware.
This type of attack is carried out by the state or nationally sponsored actors with the aim of
espionage or sabotage against organizations that compete (strategically or politically)
against the interests of the sponsor.
Their activity is based on persistence, seeking to remain undetected for prolonged periods.
APT activities take place within the framework of strategic socio-political events, as well as
in specific geopolitical scenarios.
In this sense, the main APT activities during the first half of 2022 have been framed by different
ongoing strategic scenarios, such as the bid for Chinese international leadership or the Russian
invasion of Ukraine.
Following the monitoring and detection of activity in the first half of 2022, it is considered
that the distribution of the so-called Wiper by Russian APTs, among strategic targets in
European countries and NATO member states, has been one of the main threats to critical
infrastructures due to its destructive potential in the cybernetic field.
The scenario of the military conflict between Russia and Ukraine has led to an increase in
the cyber activity of Russian APTs such as APT28, APT29, and Gamaredon, distributing
infection campaigns with destructive malware and cyber espionage.
Likewise, limited information has been obtained from Russian APTs such as Turla or DoppleSpider,
known for their activity in cyberespionage and extortion tasks, which could demonstrate the
opacity of their activity, although it is not ruled out that their actions have been limited to
internal reasons of the group.
In this regard, S21sec highlights the activity of the APT28 group (Fancy Bear, Strontium,
Pawn Storm, Sednit, Tsar Team, Iron Twilight, Sofacy). The following are some of the
group's identified characteristics:
The targets of the Its activity for 14 The APT 28 group is The impact of these
threat actor in years has resulted characterized by attacks is
question are in cyberattacks the use of various considered high
distinguished by against malware since 2008 risk for the targeted
being of high government in which it has entities due to the
strategic level entities of implemented ability of the APT to
such as aerospace, countries aligned constant evade defenses and
government, with the European improvements with gain persistence,
technology, and Union and NATO, the primary objective the ability to
energy, among highlighting its of making the exfiltrate confidential
others. latest actions in the victim's systems information, the
context of the unable to detect collection of
Russian-Ukrainian the execution and credentials and
conflict with the presence of the access, as well as
distribution of malware. the dissemination of
phishing campaigns malware in critical
with destructive systems.
malware and cyber
espionage.
Given the capabilities of Russian APTs and their latest actions in scenarios of geopolitical
disputes, it is considered likely that their activity will remain at a high level with potential
cyberattacks that could diversify their TTPs, which would pose a risk to critical target
infrastructures.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
These threat actors are credited with sponsorship from the Chinese nation-state, which
provides resources and support for intrusion, espionage, and sabotage activities to be
carried out against various strategic targets for the country.
With major campaigns over the last few years, in the first half of 2022, they have expan-
ded their targets by taking advantage of the international threat scenario, exploiting new
vulnerabilities, and using new tactics to carry out attacks on major organizations around
the world.
Several actors linked to China have been identified exploiting the Follina vulnerability
(CVE-2022-30190) in the Microsoft Support Diagnostic Tool (MSDT) against
organizations in different countries, including Belarus and Russia, as well as the
MAY Tibet region.
Among the threat actors exploiting the vulnerability, the Chinese APTs Twisted
Panda and TA413 have been identified.
During these six months, Chinese APTs have also developed different malicious codes to
perpetrate attacks against specific targets
During this period, for example, it was discovered that the WinDealer malware, spread by the
LouYu APT, can be introduced through a man-on-the-side attack.
This innovative development makes it possible to modify network traffic in transit to insert
malicious payloads.
These attacks are particularly dangerous and harmful because they do not require any
interaction with the target for the infection to succeed.
In addition to exploiting vulnerabilities and using new malicious code, Chinese APTs have
diversified their activity, moving into conducting sophisticated cryptocurrency theft
scams that use social engineering tactics to lure victims from dating applications (apps)
to fraudulent platforms.
These types of campaigns have been carried out by Chinese APT groups such as APT41,
which in recent months have been involved in financially motivated cybercrime, such
as cryptocurrency theft.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
This threat, which spreads through malicious e-mails (malspam) with massive infection
campaigns, returned to activity after attempts to disrupt its operation last year.
its operators have carried out constant malspam campaigns in Latin America (with
particular impact on Mexico) and Europe (with activity in countries such as Italy or Germany)
in the first quarter of 2022.
In addition, due to the characteristics of its campaigns and the mechanisms it uses to
distribute itself, Emotet has diversified the use of downloaders, and the use of threats
via e-mail (mainly phishing).
These new operations have made use of lures as diverse as electronic notifications of
alleged bank invoices or greetings for social and festive events.
During the first half of 2022, in the case of security incidents that
have resulted in data breaches due to the nature of the information
exposure, they mainly respond to economic motivations on the part
of cybercriminals, who aim to make a profit for the information
extracted from victims.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
The main techniques used are social engineering, brute force attacks, credential stuffing,
malware, or other types of attacks.
Among the data compromised in the data breaches during the first half of the year, personal
information (full names, addresses, e-mails, telephone numbers, etc.) stand out.
Among the main data breaches by sector affected, the following stand out:
JANUARY
Red Cross was the victim of a cyberattack that exposed the data and personal
information of more than half a million people. The data came from at least 60
Red Cross and Red Crescent societies worldwide. According to official reports,
the attack targeted an external company in Switzerland that the ICRC contracts
to store data on the Red Cross and Red Crescent societies worldwide.
FEBRUARY
The Croatian telephone operator A1 Hrvatska was the victim of a security incident in
which confidential information affecting approximately 200,000 customers was
exposed. The information accessed included full names, personal identification
numbers, physical addresses, and telephone numbers.
MARCH
Ikea Canada confirmed that in March it suffered a data breach involving the personal
information of approximately 95,000 customers.
T H R E AT L A N D S C A P E R E P O R T First semester 2022
APRIL
U.S. automaker General Motors revealed it was the victim of a credential stuffing
attack in April that exposed some customers' information and allowed hackers to
redeem reward points for gift cards.
MAY
In May 2022, a state audit revealed a data leak at the Texas Department of Insurance
that compromised 1.8 million individuals. The data in question, including Social
Security numbers and other sensitive personal information, was widely available on
the department's website from March 2019 through January 2022
JUNE