Authored by Trellix’s Advanced Research Center, this report (1) highlights insights, intelligence, and guidance gleaned from multiple sources of critical data on cybersecurity threats, and (2) develops expert, rational, and reasonable interpretations of this data to inform and enable best practices in cyber defense. This edition focuses on data and insights captured between January 1, 2023, and March 31, 2023.
I spend a great deal of time speaking with board members, CEOs, CISOs, CIOs, CTOs, and other leaders responsible for the cyber defense of nations, governmental agencies, and private sector organizations across industries.
We cover a wide range of topics – from global research, innovation, and intelligence to their SecOps teams’ latest cyber defense practices. We talk about their challenges, as Trellix recently documented in our Mind of the CISO thought leadership – e.g., too many different sources of information (35%), changing regulatory mandates and legal requirements (35%), growing attack surfaces (34%), a shortage of skilled staff (34%), and a lack of buy-in and use from other parts of the company (31%).
Almost every one of these interactions, directly or implicitly, addresses the nature of the threat environment. What kinds of attacks are unfolding? What are the most impactful ransomware groups? Which vulnerabilities are targeted? Which nation-states appear to be most active? What threat trends are we tracking in email and network security?
At Trellix, we have a lot to share, because we are on the frontlines every day. We’re tapping into a massive reservoir of security intelligence, insights, and data gleaned from more than one billion sensors worldwide. As a board member, CEO, CISO, CIO, CTO, or SecOps team member, this knowledge – shared in this report and across Trellix’s rich library of guidance, information and perspectives – is often critical to your mission.
My colleague John Fokker, who leads the threat intelligence practice within Trellix’s elite Advanced Research Center team, has compiled an excellent report here. Use these insights to help focus your team, tighten your processes, and get the right XDR technologies in place. And let us know where we can focus in future editions to help keep your organization safe, secure, and thriving.
I work with heroes. I’m not referring to my team, though they’ve been viewed as having superpowers throughout their various public and private sector careers.
I’m referring to you. I’m talking about the people and teams worldwide who rely on Trellix’s advanced research capabilities – our systems, insights, and intelligence – to protect your organizations from cyberattacks. CISOs, CTOs and CIOs, yes, as well as our colleagues at agencies like Europol, the FBI and NSA, the Cybersecurity and Infrastructure Security Agency (CISA), Australia’s Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK). Just as importantly – and perhaps even more so – I’m talking about every member of your SecOps team.
What do you think are game changers for your SecOps mission? According to the Trellix report my colleague Yossi mentioned above, cybersecurity leaders around the globe shared their point of view on these. They included better visibility (44%), stronger prioritization of what matters (42%), broader collaboration to address multi-vector attacks (40%), and improved accuracy (37%) [source].
Every one of these factors relies fundamentally on accurate insights, intelligence, and data – like the contents of this report.
As you know intimately from your work every day, cybersecurity is evolving remarkably quickly. Breakthroughs in technology and a powerful shift toward XDR. Shifts in regulation, from laws to liability. Changes in the threat environment. There’s a revolution under way, a transformation in how SecOps teams can stay “one step ahead” of the next generation in cyberattacks. Winning always starts with insights, with an understanding of our current state.
We’re in this together. Trellix has your back. This report is for you.
Interpreting the data in this report requires understanding “the bigger picture” on a global scale. That’s because cyber threats to organizations worldwide don’t occur in a technical vacuum. Among the major drivers of cyber risk are wars and other forces majeures, large-scale shifts in economic cycles, and new vulnerabilities that can emerge any time a team introduces changes to factors such as business models, key partners, core processes, technology adoption, and regulatory compliance. A sampling of factors influencing our Q1 2023 threat data includes:
What is one of the most critical challenges for cybersecurity practitioners and SecOps teams?
To digest threat intelligence intake – at speed and at scale – and push actionable insights immediately to threat-hunting teams and task forces across organizations.
Trellix’s goal? Simplify that journey.
How? By providing the level of automation to get to the responses that organizations need to focus on, using our superior threat intelligence, threat hunting and security operation capabilities embedded into our XDR, host protection, network, and mail products.
This year’s Q1 threat environment was also influenced by in-house factors, many of which reflect ongoing headwinds confronting cybersecurity leaders and frontline teams.
Trellix's seasoned, world-class experts from our Advanced Research Center gather the statistics, trends, and insights that comprise this report from a wide range of global sources, both captive and open. The aggregated data is fed into our Insights and ATLAS platforms. Leveraging machine learning, automation, and human acuity, the team cycles through an intensive, integrated, and iterative set of processes – normalizing the data, analyzing the information, and developing insights meaningful to cybersecurity leaders and SecOps teams on the frontlines of cybersecurity worldwide. For a more detailed description of our methodology, please see the end of this report.
It’s imperative that any Industry-leading assessment team understands, acknowledges and, where possible, mitigates the effect of bias – the natural, embedded, or invisible inclination to accept, reject, or manipulate facts and their meaning. The same precept holds true for consumers of the content.
Unlike a highly structured, control-base mathematical test or experiment, this report is inherently a sample of convenience – a non-probability type of study often used in medical, healthcare, psychology, and sociology testing that makes use of data that is available and accessible.
Central to this investigative ethic is the following:
What does the information contained in this report mean for cybersecurity heroes on the frontlines? Cybersecurity insights and data are only useful if they are transformed into action – and result in lower risk, improved decision-making, or more efficient or cost-effective SecOps activities.
The security incidents discussed in this section are based on public reports. In the first quarter of 2023, windows binaries, third-party tools, custom malware, and penetration-testing tools continued to impact operations as threat actors exploited paths of least resistance. PowerShell and the Windows Command Shell continued to be abused to spawn tasks leading to persistence, deployment, and extraction.
Top 5 Windows Binaries Used in Q1 2023 Public Reports
1.
PowerShell
2.
Windows CMD
3.
Scheduled Task
4.
RunDLL32
5.
WMIC
Scheduling tasks, inserting malicious DLL files, and commands executing through Windows management instrumentation rounded out the top 5. Whether executed by scripts or manual keyboard entry, threat actors continued to make use of the unprotected and unmonitored binaries already at their disposal.
In many cases, third-party tools, freeware, and penetration testing tools play a role in an attack lifecycle assisting threat actors in setting persistence, running scripts, discovering and collecting targeted information, and escalating privileges to access assets or data that are otherwise inaccessible to restricted accounts. Additionally, when used for privilege escalation, an attacker can run installation processes with elevated privileges and access areas, assets, or data that are otherwise inaccessible to restricted accounts.
Third-Party Tools Used in Q1 2023 Public Reports
Tool Categories
Third-Party Tools Used in Q1 2023 Public Reports
Specific Tools
cURL
Cobalt Strike
wget
UPX
BITS Job
Mimikatz
7-Zip
VMProtect
Themida
cURL
Cobalt Strike
wget
UPX
BITS Job
Mimikatz
7-Zip
VMProtect
Themida
The more nefarious third-party tools such as Cobalt Strike, MimiKatz, and Sharphound are used in legitimate scenarios. Pen testers attempting to infiltrate a network may use these tools when gathering passwords, setting beacons, or elevating privileges. Threat actors use them in the same way, cutting development time and allowing an attacker to take advantage of tools recently used or accidentally left on a machine, or to reside on the system of a curious end user.
Threat Actors Active in Q1 2023 Public Reports
1.
Magecart Group
5%
2.
APT29
4%
3.
APT41
4%
4.
Blind Eagle
4%
5.
Gamaredon Group
4%
6.
Lazarus
4%
7.
Mustang Panda
4%
8.
Sandworm Team
4%
Sectors Targeted in Q1 2023 Public Reports
1.
Manufacturing
8%
2.
Finance
7%
3.
Health
6%
4.
Telecom
5%
5.
Energy
5%
In the first quarter of 2023, the Magecart Group, APT29, and APT41 were the three most active threat groups and APTs to target users by geolocation and sectors as methods to collect monetary value, uncover government secrets, or inhibit infrastructure use. We were surprised to discover that the Magecart Group topped the list as it rarely operates at the scale of the other major nation-state-affiliated APTs. We will be monitoring the group’s activity in the months ahead to gauge whether the current period’s data signals the group’s re-emergence on the global stage.
Less sophisticated spray-and-pray techniques designed to snag anyone who might click or download plagued sectors in past global campaigns. Targeted attacks have evolved in sophistication, increasing in persistence against manufacturing, finance, and health sectors. Though the remaining two sectors, telecom and energy, appear to have been targeted less frequently in global events, both are equally important and organizations within them may not have reported a breach or remain unaware of an incident.
Reported events analyzed and vetted by our research team contain a wealth of information, correlations, or attributions of an individual threat actor, a threat group, or a more sophisticated APT. The tools, techniques, and procedures along with malware families include loader and downloader malware, RATs, information stealers, and ransomware. In the Q1 2023 events analyzed and available via Insights, we determined that Ukraine was targeted most frequently, followed closely by the U.S.
The Royal Ransom, Trigona, and Maui ransomware families were the heavy hitters in Q1 2023. Trellix recently published a detailed analysis of Royal Ransom and its inner workings with Windows and Linux executables. Although statistics represented emerged specifically from our Insights platform, many additional events occurred across the globally connected infrastructure – including known events either reported or kept private and events that have yet to be identified and remediated.
Countries Targeted in Q1 2023 Public Reports
7
In the public events available for analvsis, we determined that Ukraine was the most targeted country by threat actors, followed closely by the United States
1.
Ukraine
7%
2.
United States
7%
3.
Germany
4%
4.
South Korea
3%
5.
India
3%
Ransomware Used in Q1 2023 Public Reports
1.
Royal Ransom
7%
2.
Trigona
4%
3.
Maui
4%
4.
Magniber
3%
5.
LockBit
3%
The statistics displayed below are those of the campaigns, not the detections themselves. Our global telemetry revealed indicators of compromise (IoCs) belonging to several campaigns from various ransomware groups.
It’s fairly common to see a drop in cybercriminal activity at the start of the year, especially in January. This trend could explain the notable decrease in activity for both Hive and Cuba. Furthermore, the FBI and Europol’s disruption of Hive’s activities in late January would have significantly interfered with their operations. LockBit continues to be a major family in the ransomware space – and is especially aggressive and seemingly successful at pushing victims to pay their ransoms.
Ransomware Used in Q1 2023 Events
8
Cuba was the most active ransomware group, followed by Play and LockBit.
Ransomware Tools Used in Q1 2023 Events
28
Cobalt Strike continues to be a tool heavily favored by ransomware groups – only growing in ransomware usage despite vendor Fortra’s attempts to make it harder for threat actors to abuse the tool in late Q4 2022.
Countries Most Impacted by Ransomware Groups Q1 2023
15
The United States continues to be the country most impacted by ransomware activity, closely followed by Turkey this quarter.
1.
United States
15%
2.
Turkey
14%
3.
Portugal
10%
4.
India
6%
5.
Canada
6%
Sectors Most Impacted by Ransomware Groups Q1 2023
1.
Insurance
20%
2.
Financial Services
17%
3.
Pharma
7%
4.
Telecom
4%
5.
Outsourcing & Hosting
4%
Ransomware groups extort victims by publishing their information on websites referred to as “leak sites,” using the exposure to jumpstart stalled negotiations with victims or when payment of the ransom is refused. Our Trellix experts use RansomLook, an open-source tool, to collect data from the posts, and then normalize and enrich the results to provide an anonymized analysis of victimology.
It is important to note that not all ransomware victims are reported in the respective leak sites. Many victims pay the ransom and remain unreported. The metrics below are an indicator of the victim ransomware groups targeted for extortion or retaliation and should not be confused with the total number of victims.
Ransomware Groups Reporting Most Victims Per Leak Sites Q1 2023
1.
LockBit 3.0
30%
2.
Hive
22%
3.
Clop
12%
4.
Royal Ransom
7%
5.
ALPHV
5%
Sectors Affected by Ransomware Groups per Leak Sites Q1 2023
1.
Industrial Goods & Services
25%
2.
Retail
14%
3.
Technology
11%
4.
Health
8%
5.
Financial Services
6%
Countries of Companies Affected by Ransomware Groups per Leak Sites Q1 2023
48
of victim companies listed on ransomware groups’ leak sites were based in the United States.
Size of Companies Affected by Ransomware Groups Per Leak Sites Q1 2023
Employee Range
1.
51-200
32%
2.
1,000-5,000
22%
3.
11-50
15%
4.
201-500
15%
5.
501-1,000
15%
Annual Revenue
1.
$10M–$550M
25%
2.
$1B–$10B
14%
3.
$1M–$10M
11%
4.
$100M–$250M
8%
5.
$500M–$1B
6%
Insights on nation-state group activity gathered from multiple sources create a better picture of the threat landscape and help reduce observation bias. First, we depict the statistics extracted from the correlation of nation-state groups, IoCs, and Trellix customer telemetry. Secondly, we provide insights from various reports published by the security industry that are vetted, parsed, and analyzed by the Threat Intelligence Group.
As noted above, these statistics are those of the campaigns, not the detections themselves. Due to various log aggregations, our customers’ use of threat simulation frameworks, and high-level correlations with the threat intelligence knowledge base, the data is manually filtered to meet our analysis goals.
Our global telemetry showed IoCs related to several campaigns from APTs. We continue to see China-affiliated threat actors dominate the global landscape, particularly with Mustang Panda driving a significant majority of detections in Q1 2023. Since they rely heavily on sideloading and other techniques for stealth, it’s possible that China-affiliated APT groups rotate their malware tools less frequently compared to other threat actors, and – if so – this practice could lead to “projection bias” or an inflated estimate of the detections of China-affiliated hashes.
The following threat actors and their countries, their tooling and techniques as well as impacted countries and sectors represent the most prevalent in the campaigns we identified.
Most Prevalent Threat-Actor Countries Behind Nation-State Activity Q1 2023
79
China accounted for a dominant majority of the nation-state-related activity in Q1 2023.
Most Prevalent Threat-Actor Groups Q1 2023
1.
Mustang Panda
72%
2.
Lazarus
17%
3.
UNC4191
1%
4.
Common Raven
1%
5.
APT34
1%
Most Prevalent MITRE ATT&CK Techniques Used in Nation-State Activity Q1 2023
1.
DLL Side-Loading
14%
2.
Deobfuscate/Decode Files for Information
11%
3.
Ingress Tool Transfer
10%
4.
Data from Local System
10%
5.
File and Directory Discovery
10%
Most Prevalent Malicious Tools Used in Nation-State Activity Q1 2023
38
PlugX accounted for 38% of malicious nation-state activity in Q1 2023.
1.
PlugX
38%
2.
Cobalt Strike
35%
3.
Raspberry Robin
14%
4.
BLUEHAZE/DARKDEW/MISTCLOAK
3%
5.
Mimikatz
3%
India is one of the leading countries in Asia and neighboring regions with capable cyber programs. Some groups -- predominantly China-linked threat actors – have demonstrated great interest in India’s technological, military, and political developments. A notable number of detections in India can be attributed to the China-linked threat actor Mustang Panda.
Countries with Most Detections of Nation-State Activity Q1 2023
34
The Philippines led countries with the most detections of nation-state activity in Q1 2023.
Sectors with Most Detections of Nation-State Activity Q1 2023
Energy/Oil & Gas
Outsourcing & Hosting
Wholesale
Financial
Education
Government
Energy/Oil & Gas
Outsourcing & Hosting
Wholesale
Financial
Education
Government
Trellix Advanced Research Center’s experts in reverse engineering and vulnerability analysis continuously monitor the latest vulnerabilities in order to provide guidance to customers on how threat actors are leveraging them and how to mitigate the probability and impact of these attacks.
One of our most critical – but unsurprising – findings for 2023’s first quarter is that many of this period’s most critical vulnerabilities consisted of bypasses to patches for older CVEs, supply chain bugs resulting from the utilization of outdated libraries, or long-patched vulnerabilities persisting far past their expected five minutes of fame.
Consider CVE-2022-47966, for example, a critical (9.8) vulnerability in Zoho’s ManageEngine products that made the rounds this January. ManageEngine is used by thousands of companies worldwide, so we weren’t surprised when exploitation of this vuln was detected in the wild. What astonished us was the root cause: utilization of Apache Santuario 1.4.1 – a version nearly old enough to vote – which contained a known issue allowing for XML injection. Zoho patched the vulnerability across its suite of products in October and then, almost three months later in Q1, CISA released an advisory warning of in-the-wild exploitation and urging vendors to patch.
Another example is CVE-2022-44877, a critical vulnerability in Control Web Panel (CWP). Although not directly related, this vulnerability has many of the same characteristics as our previous example: it is another 9.8 RCE that saw widespread active exploitation in January despite being patched back in October. The root cause was not exactly Black Hat-talk worthy, either: command injection using standard shell variable expansion in a URL parameter.
A third example is CVE-2021-21974, a vulnerability in VMware ESXi’s OpenSLP service that was addressed back in February 2021, almost exactly two years before its sudden resurgence due to in-the-wild exploitation. When we reported on this vulnerability in our February Bug Report, we noted around 48,000 internet-reachable servers were still running vulnerable versions of ESXi according to Shodan. Today, that number is still over 38,000 – a change of less than 22%.
Late February 2023
48,471
Late April 2023
38,047
Table 1: Results of Shodan scan for vulnerable ESXi instances performed in late February and late April.
We found a few examples of our own when researching Apple devices earlier this year: CVE-2023-23530 and CVE-2023-23531. These two vulnerabilities differ from the previous examples in that their impact is limited to local elevation of privilege and not RCE. This is not a reason to overlook their significance, however, as a very similar vulnerability was leveraged by the FORCEDENTRY exploit, which was used by NSO Group to deploy their Pegasus spyware back in 2021. In fact, the two CVEs we uncovered utilize the same primitive that served as the basis for the FORCEDENTRY exploit: an innocuous class called NSPredicate. Unfortunately, Apple’s approach to mitigating FORCEDENTRY involved the use of an extensive denylist to shore up the ways NSPredicate was being abused – a mitigation which failed to address the underlying problem and allowed us to bypass it.
It is tempting to point to trends such as these and conclude vendors don’t take security seriously or bemoan the regurgitation of old exploits by threat actors and researchers, but this isn’t the right takeaway. Vulnerability researchers engage in variant analysis because an effective vulnerability researcher emulates the priorities of real threat actors, and finding a mitigation bypass or an old CVE in a rarely patched product consistently produces better ROI than reinventing the wheel. For organizations which rightfully recognize this trend, the takeaway should be this: while cutting-edge threat detection technologies are irreplaceable in the modern threat landscape, many victories can be won on the fundamentals, such as patching processes and supply chain vetting.
Email security statistics are based on telemetry generated from several email security appliances deployed on customer networks around the world.
Phishing attacks that leverage legitimate brands to scam users and steal their credentials are on the rise, with DWeb, IPFS, and Google Translate heavily utilized in email attacks. Attackers also abused freemail and other comparable services – such as the two applications PayPal Invoicing and Google Forms – to mount vishing attacks and avoid detection. Similarly targeted during this period were new brands like Scribd, LesMills, and Google Play gift cards.
Furthermore, in terms of the specific malware used for these attacks, Formbook and Agent Tesla both saw notable increases in Q1 2023, compared to late last year. This may be driven by the fact that both pieces of malware are easier to acquire and deploy, compared to Remcos, Emotet, and Qakbot.
Most Prevalent Email Malware Tactics Q1 2023
44
Formbook accounted for almost half of email malware in Q1, closely followed by Agent Tesla.
Countries Most Targeted by Email Phishing Q1 2023
30
The United States and Korea were the primary victims of email phishing attempts in Q1, receiving almost two thirds of all global phishing attempts.
1.
United States
30%
2.
South Korea
29%
3.
Taiwan
10%
4.
Brazil
8%
5.
Japan
7%
Products and Brands Most Targeted by Email Phishing Q1 2023
38
Though hundreds of brands were targeted, Microsoft products accounted for the most by a long shot in Q1 2023.
Sectors Most Impacted by Malicious Email Q1 2023
1.
Government
11%
2.
Financial Services
8%
3.
Manufacturing
8%
4.
Technology
6%
5.
Entertainment
5%
Highly Abused Web Hosting Providers Q1 2023
1.
IPFS
41%
2.
Google Translate
33%
3.
Dweb
16%
4.
AmazonAWS Appforest
3%
5.
Firebase OWA
3%
Evasion Techniques Most Used in Phishing Attacks Q1 2023
79
302 Redirect Based Evasion was the most prevalent evasion technique used by phishing attacks in Q1 2023.
46
Captcha-based attacks increased significantly (46%) in Q1 compared to Q4 2022.
In the course of detecting and blocking network-based attacks that threaten our customer, the Trellix Advanced Research Center’s network research team inspects different areas of the kill chain – from recon and initial compromise to C2 communication and lateral movement TTPs.
Malware callbacks are discovered by detecting and stopping the malware communication with its controller. Compared to Q4 2022:
Stop ransomware activity declined
90
LockBit ransomware distributed by Amadey increased by
25
Android malware activity increased by
12.5
Ursnif activity increased by
10
Smokeloader activity increased by a factor of
7
Amadey activity increased by a factor of
4
Cobalt Strike activity increased by a factor of
3
Emotet activity doubled
2
Most Impactful Attacks on Externally Facing Services Q1 2023
Cloud infrastructure attacks on services developed and delivered by Amazon, Microsoft, Google, and others continue to rise. The following data briefly describes the cloud-based attack telemetry data across our customer-based breakdown across cloud providers.
Valid Accounts
3,437
4,312
997
Modify Cloud Compute Infrastructure
4,268
0
17
Non-Standard Port
115
0
17
MFA
190
1,534
22
Network Service Discovery
141
93
0
Brute Force
25
1,869
22
Proxy
299
2,744
135
Account Discovery
264
68
787
Email Forwarding Rule
25
0
22
Execution through API
1,143
0
252
Collection: Trellix and our seasoned, world-class experts from our Advanced Research Center gather the statistics, trends and insights that comprise this report from a wide range of global sources.
Normalization: The aggregated data is fed into our Insights and ATLAS platforms. Leveraging machine learning, automation, and human acuity, the team cycles through an intensive, integrated, and iterative set of processes – normalizing the data, enriching results, removing personal information, and identifying correlations across attack methods, agents, sectors, regions, strategies, and outcomes.
Analysis: Next, Trellix analyzes this vast reservoir of information, with reference to (1) its extensive threat intelligence knowledge base, (2) cybersecurity industry reports from highly respected and accredited sources, and (3) the experience and insights of Trellix cybersecurity analysts, investigators, reverse engineering specialists, forensic researchers, and vulnerability experts.
Interpretation: Finally, the Trellix team extracts, reviews, and validates meaningful insights that can help cybersecurity leaders and SecOps teams (1) understand the most recent trends in the cyber threat environment, and (2) use this perspective to improve their ability to anticipate, prevent and defend their organization from cyberattacks in the future.
Trellix Advanced Research Center Discovers a New Privilege Escalation Bug Class on macOS and iOS
As the cybersecurity industry’s most comprehensive charter, the Trellix Advanced Research Center is at the forefront of emerging methods, trends, and actors across the global threat landscape and serves as the premier partner of security operations teams across the world. The Trellix Advanced Research Center provides intelligence and cutting-edge content to security analysts while powering our leading XDR platform. Furthermore, the Threat Intelligence Group within the Trellix Advanced Research Center offers intelligence products and services to customers globally.
Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerated technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security.
Subscribe to Receive Our Threat Information
This web page and the information continued herein describes computer security research for educational purposes only and the convenience of Trellix customers. Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy I Trellix. Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability.
Trellix is a trademark or registered trademark of Musarubra US LLC or its affiliates in the US and other countries. Other names and brand may be claimed as the property of others.