Events

LANDesk Interchange 2011, Poison Ivy, and US Incidents


LANDesk Interchange 2011 is winding down in Las Vegas today. The event gathered partners and displayed newer technologies offered by the decade old systems management company. It was interesting hearing from IT “old-timers” that have worked with the technology, describing the company’s impact on the industry – its spinoff from Intel, the original LANDesk AV product that wound up in another vendor’s product, and what they like about Kaspersky Lab technologies integration into the security suite. We were happy to present at our partner’s conference with “The Dark Side of Unmanaged Desktops”, where I described 2011 incidents that both I and our Global Emergency Response Team have investigated and remediated, some incidents in the news, and some of the IT mismanagement issues that enabled these incidents to occur.


Included in the deck were slides about 2011 malware organizational outbreaks like Zbot, Morto, Qbot, and various targeted attacks. It was disappointing but enlightening to hear more about Qbot’s effective password protection dismantling and infiltration at some of these sites, and the problems that these guys are having with internal web development teams’ reliance on one specific web browser.



Also in the news has been discussion of Poison Ivy as an attack tool utilized by the APT. Other vendors seem to think that it was coded by Chinese developers, and that is incorrect. To help correct the inaccuracy so we better understand the characteristics of attackers, their tools and capabilities, I laid out a pedigree of that RAT, and some simple info about how it’s being used. Simply put, it was developed by swedish (not chinese) developers, mostly one kid in particular, and continues to be freely distributed along with an SDK.

LANDesk Interchange 2011, Poison Ivy, and US Incidents

Your email address will not be published.

 

Reports

Kimsuky’s GoldDragon cluster and its C2 operations

Kimsuky (also known as Thallium, Black Banshee and Velvet Chollima) is a prolific and active threat actor primarily targeting Korea-related entities. In early 2022, we observed this group was attacking the media and a think-tank in South Korea.

Andariel deploys DTrack and Maui ransomware

Earlier, the CISA published an alert related to a Stairwell report, “Maui Ransomware.” Our data should openly help solidify the attribution of the Maui ransomware incident to the Korean-speaking APT Andariel, also known as Silent Chollima and Stonefly.

Subscribe to our weekly e-mails

The hottest research right in your inbox