Malware & RansomwareHIGH

Lua-Based Malware LucidRook Targets Taiwanese NGOs

Featured image for Lua-Based Malware LucidRook Targets Taiwanese NGOs
#LucidRook#spear-phishing#Taiwanese NGOs#Cisco Talos#LucidPawn

Original Reporting

TACisco Talos Intelligence·Ashley Shen

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameLucidRook
Malware TypeStager
Threat ActorUAT-10362
Target PlatformWindows
Delivery MethodSpear-Phishing
Persistence MechanismLNK file in Startup folder
C2 InfrastructureCompromised FTP servers
CapabilitiesStealth, reconnaissance, payload execution
IOCs AvailableMalicious LNK/EXE files, decoy documents
Detection Rate
MITRE ATT&CKT1566.001 - Spearphishing Attachment
🎯

Basically, a new malware called LucidRook is tricking Taiwanese organizations through fake emails.

Quick Summary

Cisco Talos has uncovered LucidRook, a new Lua-based malware targeting Taiwanese NGOs. This sophisticated malware uses spear-phishing tactics to infiltrate organizations. Vigilance is crucial as it employs advanced evasion techniques.

What Happened

Cisco Talos has identified a new malware family named LucidRook that is being used in targeted attacks against Taiwanese non-governmental organizations (NGOs) and universities. This malware is being delivered through spear-phishing campaigns, where attackers send deceptive emails to lure victims into executing malicious files. The malware is sophisticated, embedding a Lua interpreter and utilizing Rust-compiled libraries within a dynamic-link library (DLL).

How It Works

LucidRook operates as a stager that downloads and executes Lua bytecode payloads. The initial infection is facilitated through two distinct chains: one using malicious LNK files and the other using EXE files disguised as legitimate software. The LucidPawn dropper is a key component in the LNK-based infection chain, which executes PowerShell scripts to launch the embedded malware. The EXE-based chain masquerades as a security application, leveraging social engineering to deceive users.

Who's Being Targeted

The primary targets of these attacks are Taiwanese NGOs and universities. The attackers have demonstrated a clear focus on these entities, suggesting a strategic motive behind the choice of victims. The use of Traditional Chinese in the malware and its delivery methods indicates a tailored approach aimed at specific geographic and linguistic demographics.

Signs of Infection

Indicators of compromise for LucidRook include:

  • Unusual emails with shortened URLs leading to password-protected archives.
  • Executable files masquerading as legitimate software, particularly security applications.
  • Presence of files named like legitimate system tools but located in suspicious directories.

How to Protect Yourself

Organizations should take the following steps to defend against LucidRook and similar threats:

  • Implement email filtering solutions to detect and block spear-phishing attempts.
  • Educate employees on recognizing suspicious emails and attachments.
  • Regularly update and patch systems to close vulnerabilities that malware could exploit.
  • Monitor for unusual activity, especially in file execution and network traffic.

Conclusion

The emergence of LucidRook highlights the evolving landscape of malware threats. With its sophisticated design and targeted approach, it poses a significant risk to organizations in Taiwan. Continuous vigilance and proactive security measures are essential to mitigate the risks associated with such advanced threats.

🔍 How to Check If You're Affected

  1. 1.Check email headers for suspicious sender addresses.
  2. 2.Look for unusual file types or extensions in email attachments.
  3. 3.Monitor for unexpected PowerShell executions on endpoints.

🏢 Impacted Sectors

TechnologyEducation

🗺️ MITRE ATT&CK Techniques

Pro Insight

🔒 Pro insight: The use of Lua in malware development indicates a trend towards more modular and adaptable attack vectors, complicating detection efforts.

Sources

Original Report

TACisco Talos Intelligence· Ashley Shen
Read Original

Related Pings

HIGHMalware & Ransomware

Dutch Healthcare Software Vendor - Ransomware Attack Disrupts Services

A ransomware attack has taken down Dutch healthcare vendor ChipSoft, disrupting services for hospitals nationwide. This incident highlights ongoing cyber threats in the healthcare sector, raising concerns about patient data security.

The Register Security·
HIGHMalware & Ransomware

Masjesu DDoS Botnet Targets IoT Devices with Evasive Tactics

The Masjesu botnet is targeting IoT devices for DDoS attacks. With its evasive tactics, it avoids critical infrastructure and blacklisted IPs. Understanding its operation is crucial for defense.

SecurityWeek·
HIGHMalware & Ransomware

Malicious Chrome Extension - Injects Malware in Browsers

A new malicious Chrome extension, Amazing Refresh, is hijacking user clicks and monetizing traffic without consent. This poses risks to both users and website owners. Immediate action is needed to remove the extension and protect users.

Scott Helme·
HIGHMalware & Ransomware

NightSpire Ransomware - Analyzing Evolving IOCs and TTPs

A recent NightSpire ransomware incident shows how evolving tactics complicate detection and recovery. Organizations must adapt to these changes to protect their data.

Huntress Blog·
HIGHMalware & Ransomware

Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled

Storm-1175 has been identified as a rapidly executing ransomware group that exploits newly disclosed vulnerabilities to deploy Medusa ransomware within 24 hours. Their tactics pose significant risks to various sectors, especially healthcare and finance.

Microsoft Security Blog·
HIGHMalware & Ransomware

Trojanized PyPI AI Proxy Steals User Data Silently

The hermes-px package on PyPI poses a significant threat to developers, exfiltrating sensitive data while masquerading as a legitimate AI tool. New insights reveal advanced evasion techniques and a focus on academic users.

Cyber Security News·