{"id":444,"date":"2023-05-31T22:47:24","date_gmt":"2023-05-31T22:47:24","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=444"},"modified":"2023-05-31T22:47:24","modified_gmt":"2023-05-31T22:47:24","slug":"cyber-threat-profile-red-winterdog","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2023\/05\/31\/cyber-threat-profile-red-winterdog\/","title":{"rendered":"Cyber Threat Profile Red WinterDog"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-446 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_logofinal2.png\" alt=\"\" width=\"235\" height=\"300\" \/><\/p>\n<h3><strong>Overview<\/strong><\/h3>\n<p>The following post describes the modus operandi analysis of a threat actor named <em>Red WinterDog<\/em> by SCILabs as, which operates the <a href=\"https:\/\/blog.scilabs.mx\/en\/new-blackdog-malware-man-in-the-browser-malware-campaign-targeting-mexico\/\"><em>BlackDog<\/em> <\/a>and <a href=\"https:\/\/blog.scilabs.mx\/en\/new-blackbelen-malware-man-in-the-browser-malware-campaign-targeting-mexico\/\"><em>BlackBelen<\/em> <\/a>malware families.<\/p>\n<p><em>Red WinterDog<\/em> targets users of all types in Mexico, including employees of organizations intending to steal victims&#8217; banking and personal information, and business email accounts, using web browser malicious extensions designed primarily for Google Chrome and Edge. The initial access vectors are mainly malvertising campaigns in search engines such as DuckDuck Go and Bing, in addition to possible phishing campaigns, impersonating governmental organizations in Mexico such as the <em>Registro Nacional de Poblaci\u00f3n<\/em> (RENAPO) and the <em>Servicio de Administraci\u00f3n Tributaria<\/em> (SAT).<\/p>\n<p>Our research shows that <em>Red WinterDog<\/em> has been operating predominantly in Mexico since June 2022, making constant updates to its TTPs to evade security solutions or hinder analysis by cyber threat researchers. SCILabs detected the last activity of this adversary during May 2023.<\/p>\n<h3><strong>Geographical region of operation<\/strong><\/h3>\n<p>As a result of the open-source intelligence process and the analysis of the malicious artifacts used by this threat group, SCILabs determined with a high level of confidence that the primary country of operation is Mexico.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-448 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_mapaactividad.png\" alt=\"\" width=\"224\" height=\"336\" \/><\/p>\n<p style=\"text-align: center\">Figure 1. <em>Red WinterDog<\/em> activity map<\/p>\n<p>Based on our research, we present a timeline of <em>Red WinterDog&#8217;s<\/em> most relevant activities from June 2022 to January 2023.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-451 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_timeline.png\" alt=\"\" width=\"945\" height=\"1024\" \/><\/p>\n<p style=\"text-align: center\">Figure 2. Timelne of <em>Red WinterDog<\/em> campaigns<\/p>\n<h3><strong>About the victims<\/strong><\/h3>\n<p>During constant monitoring of the region, SCILabs identified that<em> Red WinterDog&#8217;s <\/em>main target is end users in Mexico; however, malvertising campaigns can affect the reputation of some government institutions and financial entities due to the adversary&#8217;s brand impersonation.<\/p>\n<h3><strong>Threat group&#8217;s operating model<\/strong><\/h3>\n<p><em>Red WinterDog<\/em> distributes its malware using malvertising campaigns on search engines such as DuckDuck Go and Bing, as well as possible phishing campaigns impersonating government institutions in Mexico. Based on a trends analysis conducted through open sources, we observed that the words CURP and SAT are two of the most searched words by users in Mexico, along with other words such as CFE or \u201cPasaporte\u201d.\u00a0 It is likely that adversaries also perform this type of analysis to determine which organizations they are going to impersonate in their malicious advertising campaigns and thus reach the largest number of potential victims.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-455 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_busquedas.png\" alt=\"\" width=\"610\" height=\"328\" \/><\/p>\n<p>Figure 3. Comparative of different search parameters in Mexico (<a href=\"https:\/\/trends.google.es\/trends\/explore?date=2021-01-01%202023-01-01&amp;geo=MX&amp;q=CURP,%2Fg%2F11bc6kl6v6,CFE,ACTA%20DE%20NACIMIENTO,PASAPORTE\">Google Trends<\/a>)<\/p>\n<h3><em>Malware families operated by Red WinterDog<\/em><\/h3>\n<p><em>BlackDog<\/em> and <em>BlackBelen<\/em> are the two trojans operated by the threat actor and they have particular characteristics, which are described in general terms below:<\/p>\n<h4>BlackDog:<\/h4>\n<ul>\n<li>It is installed via malicious JavaScript and HTML files.<\/li>\n<li>It can be distributed through emails with pretexts related to supposed transfers, SAT add-ons, CURP, Google Drive or through malicious campaigns in search engines such as Bing and DuckDuck Go.<\/li>\n<li>If the victim executes a malicious file coming from the Internet or downloaded from the email, a malicious extension is installed in the Chrome browser, often called &#8220;seguridad&#8221; by cybercriminals.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-452 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_blackdog.png\" alt=\"\" width=\"883\" height=\"362\" \/><\/p>\n<p style=\"text-align: center\">Figure 4. Attack flow of <em>BlackDog<\/em><\/p>\n<h4>BlackBelen<\/h4>\n<ul>\n<li>It is installed directly from the official Google Chrome or Edge store, making it particularly dangerous.<\/li>\n<li>It can be distributed through emails with pretexts related to supposed transfers, SAT add-ons, CURP, Google Drive or through malicious campaigns in search engines such as Bing and DuckDuck Go.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-453 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_blackbelen.png\" alt=\"\" width=\"928\" height=\"334\" \/><\/p>\n<p style=\"text-align: center\">Figure 5. Attack flow of <em>BlackBelen<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-447 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_malvertising2.png\" alt=\"\" width=\"682\" height=\"91\" \/><\/p>\n<p style=\"text-align: center\">Figure 6. SAT impersonating malvertising campaign<\/p>\n<p>Finally, if a user accesses a banking site, they will be redirected to a fake site or JavaScript and HTML code will be injected into the official page to impersonate banking forms and steal their information without the victim being aware of it.<\/p>\n<h3>Diamon model<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-454 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_diamondmodel.png\" alt=\"\" width=\"1581\" height=\"797\" \/><\/p>\n<p style=\"text-align: center\">Figure 7. Red WinterDog\u00b4s Diamond model<\/p>\n<h3><strong>MITRE <\/strong><strong>ATT&amp;CK \u00ae based profiling<\/strong><\/h3>\n<p>The following matrix of TTPs based on the MITRE PRE-ATT&amp;CK Framework was obtained from the analysis of different <em>BlackDog<\/em> and <em>BlackBelen<\/em> campaigns.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-450\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_prematrix.png\" alt=\"\" width=\"1206\" height=\"545\" \/><\/p>\n<p style=\"text-align: center\">Table 1. PRE-ATT&amp;CK Matrix<\/p>\n<p>The following matrix of TTPs based on the MITRE Framework was obtained from the analysis of different <em>BlackDog<\/em> and <em>BlackBelen<\/em> campaigns.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-449\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/05\/RWD_matrix.png\" alt=\"\" width=\"1365\" height=\"575\" \/><\/p>\n<p style=\"text-align: center\">Table 2. MITRE ATT&amp;CK Matrix<\/p>\n<h3><strong>Conclusions<\/strong><\/h3>\n<p>The <em>Red WinterDog<\/em> threat group is constantly modifying its malicious artifacts and the techniques used in its attacks, always with the objective of stealing banking information from users in Mexico, using one of the two malware families identified so far (<em>BlackDog<\/em> and <em>BlackBelen<\/em>), with the main technique being the use of <a href=\"https:\/\/resources.infosecinstitute.com\/topic\/mitre-attck-man-in-the-browser\/\">Man in The Browser<\/a>.<\/p>\n<p>The main characteristic of this threat is to use malicious web browser extensions for the most popular ones, and distribute them through official Google Chrome and Edge stores, along with the analysis of trends from government agencies, to design their malvertising campaigns and the phishing sites used as initial vector. The ideal victims of <em>Red WinterDog<\/em> are those users and organizations that do not have EndPoint security tools to identify the installation of malicious browser add-ons or are not aware of the new techniques used in the threat landscape affecting Latin America.<\/p>\n<p>SCILabs continues to monitor the activity of this cybercriminal group and provide IOCs to strengthen the security of our customers.<\/p>\n<p>&nbsp;<\/p>\n<h3>Recommendations<\/h3>\n<ul>\n<li>Try to enter the addresses of the pages you want to visit directly in the address bar and not through search engine results.<\/li>\n<li>Conduct awareness campaigns about malicious advertising campaigns used to distribute this malware.<\/li>\n<li>Have strict policies regarding the use and installation of add-ons or extensions in the organization&#8217;s web browsers.<\/li>\n<li>Perform constant monitoring for malicious add-ons or extensions in your organization&#8217;s browsers that are not authorized.<\/li>\n<li>Look for Chrome browser shortcuts that use the &#8211;load-extension parameter to execute suspicious, malicious, or unauthorized code or extensions in your organization.<\/li>\n<li>Verify the legitimacy, source, and developer of extensions you authorize in your organization, even if they are in the official browser stores.<\/li>\n<li>Add the indicators of compromise reflected in this research to your security solutions.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>IoCs<\/h3>\n<p><strong>Hash SHA256<\/strong><\/p>\n<pre>9A04E1EAA7A98677014D1379D0B972588A98EE0FF62BB70EE97AE26798A0DA92\nC408596DF55AD041496D306D2F67494588B1780235356B74F616DAF1669E77C1\n06EF9E6803F74A113146E41D988F74A4B83A35A86FF5CC7A991F1DD4C1A2C0E7\nBFF33D296226786E00935EDFFD5443E3031B09C12BA7CCFE0647BAD4771B437A\nB17A1DD4F287AA069A74739AD71B2D57A6F45E7DEB26C7167A4CFD55E9B20D0C\n97EE7591B48B97F6EC58424078D16DD152D5D09A1FE8BFD9554DF12B444191A0<\/pre>\n<p><strong>Domains<\/strong><\/p>\n<pre>PORTALDECONEXIONSEGURA[.]COM\nCOMPLEMENTODESEGURIDADMX[.]COM\nHERRAMIENTASNET.COM[.]MX\nSRLTPZMX[.]COM\nHXXPS[:]\/\/FACTURAMX[.]CLUB\nHXXPS[:]\/\/FACTURACIONMEXICO[.]NET\nHCBCL9[.]BUZZ<\/pre>\n<p><strong><br \/>\nURLs<\/strong><\/p>\n<pre>HXXPS[:]\/\/DRIVE[.]GOOGLE[.]COM\/UC?EXPORT=DOWNLOAD&amp;ID=1U830KFXKJB9XUCTMEGBDCTAPHEVSTENZ<\/pre>\n<p><strong>Paths<\/strong><\/p>\n<pre>%LOCALAPPDATA%\\SEGURO.JS\n%APPDATA%\\MICROSOFT\\WINDOWS\\START MENU\\PROGRAMS\\STARTUP\\\n%LOCALAPPDATA%\/\\MICROSOFT\\WINDOWS\\INETCACHE\\IE\\\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Overview The following post describes the modus operandi analysis of a threat actor named Red WinterDog by SCILabs as, which<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-444","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=444"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/444\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}