The results of Fortinet Threat Intelligence Insider Latin America for the third quarter of 2019 reveal the continuous increasing of malware, exploits and botnet activity in Latin America and the Caribbean. The main activities include unwanted adds, criptojacking, IoT intrusions, exploit of vulnerabilities and malware for steal information from users.
What are the risk areas?
In regard to the most detected vulnerabilities, DoublePulsar, the backdoor used by the WannaCry ransomware, is still a mechanism for distributing malware in Latin America. Considering it takes advantage of already resolved vulnerabilities, its continuous use evidences the vast software footprint without updates in the region, affecting companies and individuals alike.
Different variations of exploits for ransomware are still very active in Latin America.
How to defend from such multi-pronged attacks?
Botnets still raising and evidence that the common problems with IoT devices continue. Default or weak passwords are the main infection vector for Mirai botnet. Millions of devices are connected and controlled for increase infections and Denial of Services attacks. Botnets are evolving and today are able to infect not only consumers but business IoT devices for use these as proxy for anonymize transactions of the dark market.
During the third quarter of 2019, a growing number of WIFICAM attempts were detected in Latin America, an attack that aims to take control of IP cameras. Another sign of the risk that IoT devices run without proper protection from the network.
What are the implications for compromised IoT devices?
The report also reveals the most common infections in Latin America and the Caribbean:
Is classified as a trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard inputs, delete file or object, or terminate process
is classified as Trojan with backdoor properties. Backdoor Trojan has the capability to receive a remote connection from a malicious hacker and perform actions against the compromised system.
is classified as a type of adware. Adware is any software package that automatically displays advertisements while the program is running. Adware is often not malicious, but unwanted, and a user is often unaware of its being installed on the local machine.
This indicates detection of an attempted brute force login from SIPVicious svcrack. SIPVicious is a SIP scanner. Remote attackers can gain access to the service provided by the vulnerable systems.
This indicates detection of DoublePulsar Backdoor. Backdoor trojans have the capability to connect remote hosts and perform actions against the compromised system. The DoublePulsar Backdoor was revealed by the Shadow Brokers leaks in March 2017 and was used in the WannaCry ransomware attack in May 2017.
This indicates an attack attempt against an Information Disclosure vulnerability in Microsoft Windows SMB server. A remote attacker can exploit this to gain unauthorized access to sensitive information via the crafted SMB request. This vulnerability has been incorporated into various tools and is used for scanning vulnerable targets that might be affected by the vulnerabilities related to Shadow Brokers leak.
This indicates that a system might be infected by Mirai Botnet. System Compromise: Remote attackers can gain control of vulnerable IoT systems.
Andromeda is a botnet that is used to distribute malware with different capabilities, depending on the command given by its command-and-control (C&C) server. The toolkit for this botnet can be obtained on the Internet underground and is constantly being updated.
This botnet is a type of malware bot that may perform many malicious tasks, such as downloading and executing additional malware, receiving commands from a control server and relaying specific information.