{"id":6374,"date":"2021-06-02T16:04:45","date_gmt":"2021-06-02T23:04:45","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6374"},"modified":"2024-04-26T13:20:39","modified_gmt":"2024-04-26T20:20:39","slug":"nobelium-campaigns-and-malware","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/","title":{"rendered":"Cyber Threat Advisory: NOBELIUM Campaigns and Malware"},"content":{"rendered":"<h3>Author: James Barnett<\/h3>\n<h3>TLP: WHITE<\/h3>\n<p>&nbsp;<\/p>\n<h1>1. Executive Summary<\/h1>\n<p>Between 27 and 28 May, Microsoft published two reports on NOBELIUM, the threat actor behind the December 2020 supply chain attacks<sup>1<\/sup> on SolarWinds\u2019 Orion platform. The first report detailed an ongoing spearphishing campaign that leveraged a variety of techniques to distribute a Cobalt Strike Beacon payload that allows NOBELIUM to remotely control the targeted system through an encrypted network tunnel.<sup>2<\/sup> The second report detailed four tools that were part of NOBELIUM\u2019s unique infection chain in that campaign: EnvyScout, BoomBox, NativeZone, and VaporRage.<sup>3<\/sup><\/p>\n<h1>2. Analysis<\/h1>\n<h3>2.1. Spearphishing Campaigns<\/h3>\n<p>Microsoft reports that NOBELIUM has been conducting a new malicious email campaign since February 2021. It differs significantly from their previous operations that ran from September 2019 to January 2021 and that led to the breach of the SolarWinds Orion platform. In this new campaign, NOBELIUM distributed multiple waves of spearphishing emails, each revealing an evolution of their malware delivery techniques.<\/p>\n<p>The first wave of the campaign, discovered in February, leveraged the legitimate Google Firebase platform to stage an ISO file containing a malicious payload, as well as to record attributes of visitors who accessed the URLs included in the phishing emails. This wave included a brief reconnaissance period starting on 28 January, during which NOBELIUM sent the Firebase tracking URL to targets and recorded when they clicked on the URL. They did not deliver the malicious ISO payload at this stage.<\/p>\n<p>The next waves of the campaign began in March and used a malicious HTML file attached to a spearphishing email in an attempt to compromise targeted users. This HTML file used JavaScript to write an ISO file containing a malicious payload directly to the target\u2019s disk, including a message that encouraged the target to open the ISO. If the target did so, the ISO file would then be mounted in the same manner as an external drive. This allowed a shortcut file (LNK) within the ISO to execute an included dynamic-link library (DLL) that ultimately resulted in the delivery and execution of a Cobalt Strike Beacon payload. During these waves, NOBELIUM began to experiment with a distribution method that involved embedding the ISO file within the HTML attachment rather than the previous method of hosting the ISO on Firebase.<\/p>\n<p>The next waves of the campaign began in April and involved NOBELIUM completely abandoning Firebase for both its ISO distribution and victim tracking. They shifted to distributing the ISOs using the aforementioned HTML embedding method and began to use a new method of victim tracking. The campaign evolved again in May when NOBELIUM added a custom .NET module to perform reconnaissance and download additional payloads that they had stored on Dropbox.<\/p>\n<p>On 25 May, NOBELIUM\u2019s campaign began using the legitimate mass-mailing service Constant Contact to target roughly 3,000 unique accounts across more than 150 organizations. This new wave of spearphishing emails used several different types of lures, one of which imitated a special alert from the United States Agency for International Development (USAID), stating that Donald Trump had published new documents regarding election fraud, and included a link where these documents would purportedly be found. In reality, this link used Constant Contact\u2019s legitimate redirector service to send victims to a different URL that would deliver NOBELIUM\u2019s malicious ISO file.<\/p>\n<p>On 1 June, the U.S. Department of Justice announced that they had seized two of the domains involved in NOBELIUM&#8217;s spearphishing campaign (theyardservice[.]com and worldhomeoutlet[.]com) pursuant to a court order on 28 May.<sup>8<\/sup><\/p>\n<h3>2.2. EnvyScout<\/h3>\n<p>EnvyScout is a malicious HTML file that deobfuscates and writes a malicious ISO file to disk. In this campaign, the threat actors delivered the file <em>NV.html<\/em> as an attachment to the campaign\u2019s spearphishing emails. The body of this HTML file included tracking and credential harvesting URLs, an encoded ISO payload, an embedded JavaScript to decode the payload, and another embedded JavaScript to allow the HTML file to write the decoded ISO file to disk.<\/p>\n<h3>2.3. BoomBox<\/h3>\n<p>BoomBox is a malicious downloader distributed as an executable named <em>BOOM.exe<\/em> contained within the ISO dropped by EnvyScout. When executed, it checks to ensure that a directory named <em>NV<\/em> is present in its working directory and terminates if it does not find this directory. BoomBox also performs another check to ensure that the system does not contain a file named <em>%AppData%\\Microsoft\\NativeCache\\NativeCacheSvc.dll<\/em> and will terminate if it finds the file.<\/p>\n<p>After performing these checks, BoomBox proceeds to gather information about the infected system, including its hostname, domain name, IP address, and the victim\u2019s username. It encrypts this information using the Advanced Encryption Standard (AES) with a hardcoded encryption key <em>123do3y4r378o5t34onf7t3o573tfo73<\/em> and initialization vector (IV) value <em>1233t04p7jn3n4rg<\/em>. After encryption, BoomBox adds PDF file signatures to the beginning and end of the data so that the encrypted data appears to be a valid PDF file, and then uploads the file to Dropbox.<\/p>\n<p>Once BoomBox has uploaded information about the victim\u2019s system, it proceeds to download the NativeZone and VaporRage payloads from Dropbox. It then decrypts and executes these payloads to start the next stage of the attack chain.<\/p>\n<h3>2.4. NativeZone<\/h3>\n<p>NativeZone is Microsoft\u2019s name for NOBELIUM\u2019s wide variety of custom Cobalt Strike Beacon loaders. These loaders were previously tracked under unique names including TEARDROP<sup>4<\/sup> and Raindrop, but Microsoft is now tracking them under the single name NativeZone due to their disposable nature and similar purpose within NOBELIUM\u2019s attack chain. All variants of NativeZone are malicious DLLs that decrypt and load a malicious payload from an embedded code buffer or from another accompanying file.<\/p>\n<h3>2.5. VaporRage<\/h3>\n<p>VaporRage is a malicious DLL file that acts as a shellcode downloader. It contains functions that are called by NativeZone in order to download, decode, and execute arbitrary shellcode from the attacker\u2019s command and control (C&amp;C) servers. The most common shellcode payload that VaporRage currently delivers is Cobalt Strike Beacon, as observed in NOBELIUM\u2019s previous campaigns.<\/p>\n<h3>2.6. Cobalt Strike<\/h3>\n<p>Cobalt Strike is a legitimate penetration testing tool that has become increasingly popular amongst threat actors due to its many powerful features. Its capabilities include keylogging, taking screenshots, deploying additional payloads, exploiting system vulnerabilities to facilitate additional attacks, evading detection with various countermeasures, rapidly exfiltrating data through encrypted tunnels, and more.<sup>5<\/sup><\/p>\n<h1>3. Prevention and Mitigation<\/h1>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) provides the following list of best practices to strengthen the security of an organization.<sup>6<\/sup> In addition, CISA references the publication from the National Institute of Standards and Technology (NIST), \u201cGuide to Malware Incident Prevention &amp; Handling for Desktops and Laptops\u201d for more information on malware incident prevention and handling.<sup>7<\/sup><\/p>\n<ul>\n<li>Maintain up-to-date antivirus signatures and engines.<\/li>\n<li>Keep operating system patches up-to-date.<\/li>\n<li>Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.<\/li>\n<li>Restrict users&#8217; ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.<\/li>\n<li>Enforce a strong password policy and implement regular password changes.<\/li>\n<li>Exercise caution when opening email attachments even if the attachment is expected and the sender appears to be known.<\/li>\n<li>Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.<\/li>\n<li>Disable unnecessary services on agency workstations and servers.<\/li>\n<li>Scan for and remove suspicious email attachments; ensure the scanned attachment is its &#8220;true file type&#8221; (i.e., the extension matches the file header).<\/li>\n<li>Monitor users&#8217; web browsing habits; restrict access to sites with unfavorable content.<\/li>\n<li>Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).<\/li>\n<li>Scan all software downloaded from the Internet prior to executing.<\/li>\n<li>Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).<\/li>\n<\/ul>\n<h1>4. Indicators of Compromise<\/h1>\n<table width=\"680\">\n<tbody>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\"><strong>Indicator<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"148\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">boom[.]exe<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"148\">BoomBox EXE filename<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"532\">0acb884f2f4cfa75b726cb8290b20328c8ddbcd49f95a1d761b7d131b95bafec<\/p>\n<p>8199f309478e8ed3f03f75e7574a3e9bce09b4423bd7eb08bb5bff03af2b7c27<\/p>\n<p>cf1d992f776421f72eabc31d5afc2f2067ae856f1c9c1d6dc643a67cb9349d8c<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">BoomBox EXE SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">74d6b7b2[.]app[.]giftbox4u[.]com<\/p>\n<p style=\"text-align: center;\">aimsecurity[.]net<\/p>\n<p style=\"text-align: center;\">cityloss[.]com<\/p>\n<p style=\"text-align: center;\">content[.]pcmsar[.]net<\/p>\n<p style=\"text-align: center;\">cross-checking[.]com<\/p>\n<p style=\"text-align: center;\">giftbox4u[.]com<\/p>\n<p style=\"text-align: center;\">hanproud[.]com<\/p>\n<p style=\"text-align: center;\">newstepsco[.]com<\/p>\n<p style=\"text-align: center;\">stockmarketon[.]com<\/p>\n<p style=\"text-align: center;\">stsnews[.]com<\/p>\n<p style=\"text-align: center;\">tacomanewspaper[.]com<\/p>\n<p style=\"text-align: center;\">trendignews[.]com<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"148\">Cobalt Strike C&amp;C domains<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">139[.]99[.]167[.]177<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">Cobalt Strike C&amp;C IP<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">desktop[.]dll<\/p>\n<p style=\"text-align: center;\">diassvcs[.]dll<\/p>\n<p style=\"text-align: center;\">dxgim[.]dll<\/p>\n<p style=\"text-align: center;\">GraphicalComponent[.]dll<\/p>\n<p style=\"text-align: center;\">imgmountingservice[.]dll<\/p>\n<p style=\"text-align: center;\">information[.]exe<\/p>\n<p style=\"text-align: center;\">Java_SRE_runtime_update[.]dll<\/p>\n<p style=\"text-align: center;\">msch[.]dll<\/p>\n<p style=\"text-align: center;\">msdiskmountservice[.]dll<\/p>\n<p style=\"text-align: center;\">mshost[.]dll<\/p>\n<p style=\"text-align: center;\">mstu[.]dll<\/p>\n<p style=\"text-align: center;\">WRAR600[.]EXE<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">Cobalt Strike DLL filenames<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">0c14a791f8a48d2944a9fa842f45becb7309ad004695e38f48fca69135d327c6<\/p>\n<p style=\"text-align: center;\">1f5a915e75ad96e560cee3e24861cf6f8de299fdf79e1829453defbfe2013239<\/p>\n<p style=\"text-align: center;\">292e5b0a12fea4ff3fc02e1f98b7a370f88152ce71fe62670dd2f5edfaab2ff8<\/p>\n<p style=\"text-align: center;\">2a352380d61e89c89f03f4008044241a38751284995d000c73acf9cad38b989e<\/p>\n<p style=\"text-align: center;\">2ebbb99b8dae0c7b0931190fa81add987b44d4435dafcf53a9cde0f19bb91398<\/p>\n<p style=\"text-align: center;\">776014a63bf3cc7034bd5b6a9c36c75a930b59182fe232535bb7a305e539967b<\/p>\n<p style=\"text-align: center;\">88c95954800827cb68e1efdacd99093f7f9646d82613039472b5c90e5978444d<\/p>\n<p style=\"text-align: center;\">a4f1f09a2b9bc87de90891da6c0fca28e2f88fd67034648060cef9862af9a3bf<\/p>\n<p style=\"text-align: center;\">bca5560a9a9dd54be76e4a8d63a66e9cfd731b0bd28524db05cc498bb5b56384<\/p>\n<p style=\"text-align: center;\">c4ff632696ec6e406388e1d42421b3cd3b5f79dcb2df67e2022d961d5f5a9e78<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">Cobalt Strike DLL SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">f9a74ac540a6584fc3ba7ccc172f948c6b716cceea313ce1d9e7b735fa2a5687<\/p>\n<\/td>\n<td width=\"148\"><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"532\">reply slip[.]rtf<\/p>\n<p>Reply slip[.]rtf<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">Cobalt Strike encrypted payload filenames<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">7a3b27cf04b7f8110fc1eee5f9c4830d38ac00467fc856330115af4bffaf35b6<\/p>\n<p style=\"text-align: center;\">7bf3457087ea91164f86f4bb50ddb46c469c464c300228dba793f7bfe608c83e<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">Cobalt Strike encrypted payload SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">enpport[.]com<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">EnvyScout C&amp;C domain<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">Attachment[.]html<\/p>\n<p style=\"text-align: center;\">attachment[.]html<\/p>\n<p style=\"text-align: center;\">cert[.]html<\/p>\n<p style=\"text-align: center;\">information[.]html<\/p>\n<p style=\"text-align: center;\">Invitation[.]html<\/p>\n<p style=\"text-align: center;\">NV[.]html<\/p>\n<p style=\"text-align: center;\">nv[.]html<\/p>\n<p style=\"text-align: center;\">Reply slip[.]html<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">EnvyScout HTML attachment filenames<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">065e9471fb4425ec0b3a2fd15e1546d66002caca844866b0764cbf837c21a72a<\/p>\n<p style=\"text-align: center;\">279d5ef8f80aba530aaac8afd049fa171704fc703d9cfe337b56639732e8ce11<\/p>\n<p style=\"text-align: center;\">2836e5553e1ae52a1591545b362d1a630e3fef7e6b7e8342a84008fe4a6473a9<\/p>\n<p style=\"text-align: center;\">6df1d7191f6dd930642cc5c599efb54bfcc964b7a2e77f6007787de472b22a6a<\/p>\n<p style=\"text-align: center;\">9059c5b46dce8595fcc46e63e4ffbceeed883b7b1c9a2313f7208a7f26a0c186<\/p>\n<p style=\"text-align: center;\">9301e48ea3fa7d39df871f04072ee47b9046d76aa378a1c5697f3b2c14aef1d6<\/p>\n<p style=\"text-align: center;\">ca83d7456a49dc5b8fe71007e5ac590842b146dd5c45c9a65fe57e428a8bd7c6<\/p>\n<p style=\"text-align: center;\">cfb57906cf9c5e9c91bc4aa065f7997b1b32b88ff76f253a73ee7f6cfd8fff2f<\/p>\n<p style=\"text-align: center;\">dcf48223af8bb423a0b6d4a366163b9308e9102764f0e188318a53f18d6abd25<\/p>\n<p style=\"text-align: center;\">f5bc4a9ffc2d33d4f915e41090af71544d84b651fb2444ac91f6e56c1f2c70d5<\/p>\n<p style=\"text-align: center;\">f7e8c9d19efd71f5c8217bf12bdd3f6c88d5f56ab65fea02dc2777c5402a18f1<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">EnvyScout HTML attachment SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">cdn[.]theyardservice[.]com<\/p>\n<p style=\"text-align: center;\">dailydews[.]com<\/p>\n<p style=\"text-align: center;\">dataplane[.]theyardservice[.]com<\/p>\n<p style=\"text-align: center;\">doggroomingnews[.]com<\/p>\n<p style=\"text-align: center;\">email[.]theyardservice[.]com<\/p>\n<p style=\"text-align: center;\">emergencystreet[.]com<\/p>\n<p style=\"text-align: center;\">smtp2[.]theyardservice[.]com<\/p>\n<p style=\"text-align: center;\">static[.]theyardservice[.]com<\/p>\n<p style=\"text-align: center;\">theyardservice[.]com<\/p>\n<p style=\"text-align: center;\">usaid[.]theyardservice[.]com<\/p>\n<p style=\"text-align: center;\">worldhomeoutlet[.]com<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NativeZone C&amp;C domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">documents[.]dll<\/p>\n<p style=\"text-align: center;\">KM[.]FileSystem[.]dll<\/p>\n<p style=\"text-align: center;\">NativeCacheSvc[.]dll<\/p>\n<p style=\"text-align: center;\">RtlSvcMicro[.]dll<\/p>\n<p style=\"text-align: center;\">Wbtr[.]dll<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NativeZone DLL filenames<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">136f4083b67bc8dc999eb15bb83042aeb01791fc0b20b5683af6b4ddcf0bbc7d<\/p>\n<p style=\"text-align: center;\">3b94cc71c325f9068105b9e7d5c9667b1de2bde85b7abc5b29ff649fd54715c4<\/p>\n<p style=\"text-align: center;\">4fbfeb7a0bb6b9841b92fa4e6b5a7bdb69c2a12ed39691c9495ff88cd6f58836<\/p>\n<p style=\"text-align: center;\">6d08b767117a0915fb86857096b4219fd58596b42ccf61462b137432abd3920e<\/p>\n<p style=\"text-align: center;\">b295c5ad4963bdffa764b93421c3dd512ca6733b79bdff2b99510e7d56a70935<\/p>\n<p style=\"text-align: center;\">ee42ddacbd202008bcc1312e548e1d9ac670dd3d86c999606a3a01d464a2a330<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"148\">NativeZone DLL SHA256s<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"532\">manual[.]pdf<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NativeZone PDF filename<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">656384c4e5f9fe435d51edf910e7ba28b5c6d183587cf3e8f75fb2d798a01eeb<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"148\">NativeZone PDF SHA256<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">financialmarket[.]org<\/p>\n<p style=\"text-align: center;\">pcmsar[.]net<\/p>\n<p style=\"text-align: center;\">techiefly[.]com<\/p>\n<p style=\"text-align: center;\">theadminforum[.]com<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM C&amp;C domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"532\">185[.]158[.]250[.]239<\/p>\n<p>195[.]206[.]181[.]169<\/p>\n<p>37[.]120[.]247[.]135<\/p>\n<p>45[.]135[.]167[.]27<\/p>\n<p>51[.]254[.]241[.]158<\/p>\n<p>51[.]38[.]85[.]225<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM C&amp;C IPs<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">ica-declass[.]pdf<\/p>\n<p style=\"text-align: center;\">Meeting info[.]docx<\/p>\n<p style=\"text-align: center;\">nv[.]pdf<\/p>\n<p style=\"text-align: center;\">state ellection changes[.]docx<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM decoy document filenames<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">574b7a80d8b9791cb74608bc4a9fcba4e4574fafef8e57bdee340728445ebd16<\/p>\n<p style=\"text-align: center;\">73ca0485f2c2c8ba95e00188de7f5509304e1c1eb20ed3a238b0aa9674f9104e<\/p>\n<p style=\"text-align: center;\">7d34f25ad8099bd069c5a04799299f17d127a3866b77ee34ffb59cfd36e29673<\/p>\n<p style=\"text-align: center;\">d37347f47bb8c7831ae9bb902ed27a6ce85ddd9ba6dd1e963542fd63047b829c<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM decoy document SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">cdnappservice[.]firebaseio[.]com<\/p>\n<p style=\"text-align: center;\">eventbrite-com-default-rtdb[.]firebaseio[.]com<\/p>\n<p style=\"text-align: center;\">humanitarian-forum-default-rtdb[.]firebaseio[.]com<\/p>\n<p style=\"text-align: center;\">security-updater-default-rtdb[.]firebaseio[.]com<\/p>\n<p style=\"text-align: center;\">supportcdn-default-rtdb[.]firebaseio[.]com<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM ISO download domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">AktualizC!ciu[.]img<\/p>\n<p style=\"text-align: center;\">Attachment[.]img<\/p>\n<p style=\"text-align: center;\">attachment[.]img<\/p>\n<p style=\"text-align: center;\">attachment[.]iso<\/p>\n<p style=\"text-align: center;\">dppy_empty[.]iso<\/p>\n<p style=\"text-align: center;\">ica-declass[.]img<\/p>\n<p style=\"text-align: center;\">ICA-declass[.]iso<\/p>\n<p style=\"text-align: center;\">information[.]iso<\/p>\n<p style=\"text-align: center;\">Invitation Document[.]iso<\/p>\n<p style=\"text-align: center;\">nv[.]img<\/p>\n<p style=\"text-align: center;\">NV[.]img<\/p>\n<p style=\"text-align: center;\">Reply slip[.]iso<\/p>\n<p style=\"text-align: center;\">SMM_Report[.]img<\/p>\n<p style=\"text-align: center;\">topics_of_discussion[.]iso<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM ISO filenames<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">2523f94bd4fba4af76f4411fe61084a7e7d80dec163c9ccba9226c80b8b31252<\/p>\n<p style=\"text-align: center;\">5f7d08eb2039a9d2e99ebf3d0ef2796b93d0a01e9b8ec403fec8fcdf46448693<\/p>\n<p style=\"text-align: center;\">60e20576b08a24cdaeaabc4849011885fb7517713226e2663031d9533d2187bc<\/p>\n<p style=\"text-align: center;\">6e2069758228e8d69f8c0a82a88ca7433a0a71076c9b1cb0d4646ba8236edf23<\/p>\n<p style=\"text-align: center;\">749bf48a22ca161d86b6e36e71a6817b478a99d935cd721e8bf3dba716224c84<\/p>\n<p style=\"text-align: center;\">7ed1b6753c94250ad3c1c675eb644940c8104ff06a123252173c33cc1be5e434<\/p>\n<p style=\"text-align: center;\">873717ea2ea01ae6cd2c2dca9d6f832a316a6e0370071bb4ee6ecff3163f8d18<\/p>\n<p style=\"text-align: center;\">89016b87e97a07b4e0263a18827defdeaa3e150b1523534bbdebe7305beabb64<\/p>\n<p style=\"text-align: center;\">94786066a64c0eb260a28a2959fcd31d63d175ade8b05ae682d3f6f9b2a5a916<\/p>\n<p style=\"text-align: center;\">98473e1b8f7bedd5cfa3b83dad611db48eee23faec452e62797fb7752228c759<\/p>\n<p style=\"text-align: center;\">a45a77ad5c138a149aa71fb323a1e2513e7ac416be263d1783a7db380d06d2fc<\/p>\n<p style=\"text-align: center;\">d19ff098fe0f5947e08ec23be27d3a3355e14fb20135d8c4145126caa8be4b05<\/p>\n<p style=\"text-align: center;\">e41a7616a3919d883beb1527026281d66e7bcdaff99600e462d36a58f1bdc794<\/p>\n<p style=\"text-align: center;\">f006af714379fdd63923536d908f916f4c55480f3d07adadd53d5807e0c285ee<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM ISO SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">AKTUALIZ[.]LNK<\/p>\n<p style=\"text-align: center;\">Attachment[.]lnk<\/p>\n<p style=\"text-align: center;\">attachment[.]lnk<\/p>\n<p style=\"text-align: center;\">information[.]txt[.]lnk<\/p>\n<p style=\"text-align: center;\">Integrated Review[.]lnk<\/p>\n<p style=\"text-align: center;\">NV[.]lnk<\/p>\n<p style=\"text-align: center;\">nv[.]lnk<\/p>\n<p style=\"text-align: center;\">Plending forms[.]lnk<\/p>\n<p style=\"text-align: center;\">Programme outline[.]lnk<\/p>\n<p style=\"text-align: center;\">reply slip[.]lnk<\/p>\n<p style=\"text-align: center;\">Reply slip[.]rtf[.]lnk<\/p>\n<p style=\"text-align: center;\">reports[.]lnk<\/p>\n<p style=\"text-align: center;\">ScanClientUpdate[.]lnk<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM LNK filenames<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">0585ed374f47d823f8fcbb4054ad06980b1fe89f3fa3484558e7d30f7b6e9597<\/p>\n<p style=\"text-align: center;\">112f92cfecdc4e177458bc1caebcc4420b5879840f137f249fac360ddac64ddd<\/p>\n<p style=\"text-align: center;\">194f4d1823e93905ee346d7e1fffc256e0befd478735f4b961954df52558c618<\/p>\n<p style=\"text-align: center;\">24caf54e7c3fe308444093f7ac64d6d520c8f44ea4251e09e24931bdb72f5548<\/p>\n<p style=\"text-align: center;\">3c86859207ac6071220976c52cef99abf18ae37ae702c5d2268948dda370910b<\/p>\n<p style=\"text-align: center;\">48b5fb3fa3ea67c2bc0086c41ec755c39d748a7100d71b81f618e82bf1c479f0<\/p>\n<p style=\"text-align: center;\">6866041f93141697ec166fe64e35b00c5fcd5d009500ecf58dd0b7e28764b167<\/p>\n<p style=\"text-align: center;\">69f0d85119123f3c2e4c052a83671732aced07312a05a3abf4ab0360c70f65de<\/p>\n<p style=\"text-align: center;\">74202eed181e2b83dd0ab6f791a34a13bd94e63e86b82395f9443cb5aeddc891<\/p>\n<p style=\"text-align: center;\">b81beb17622d4675a1c6f4efb358cc66903366df75eb5911bca725465160bdb6<\/p>\n<p style=\"text-align: center;\">d7c05bd68e8bde3d13aa7dbd6911461104d06715da15d3ee7f75136fa8330cc2<\/p>\n<p style=\"text-align: center;\">eae312c5ec2028a2602c9654be679ecde099b2c0b148f8d71fca43706efe4c76<\/p>\n<p style=\"text-align: center;\">f88530bc87cf2c133c0a50e434ce0428694901fe7860abb42737097fdea56b30<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM LNK SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">cdnappservice[.]web[.]app<\/p>\n<p style=\"text-align: center;\">eventbrite-com-default-rtdb[.]firebaseio[.]com<\/p>\n<p style=\"text-align: center;\">humanitarian-forum[.]web[.]app<\/p>\n<p style=\"text-align: center;\">logicworkservice[.]web[.]app<\/p>\n<p style=\"text-align: center;\">security-updater[.]web[.]app<\/p>\n<p style=\"text-align: center;\">supportcdn[.]web[.]app<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM spearphish URL domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">ScanClientUpdate[.]zip<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM ZIP attachment filename<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">ca66b671a75bbee69a4a4d3000b45d5dc7d3891c7ee5891272ccb2c5aed5746c<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">NOBELIUM ZIP attachment SHA256<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">holescontracting[.]com<\/p>\n<p style=\"text-align: center;\">newsplacec[.]com<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">VaporRage C&amp;C domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">CertPKIProvider[.]dll<\/p>\n<p style=\"text-align: center;\">mswsc[.]dll<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">VaporRage DLL filenames<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">117317d623003995d639975774edd1bfe38cec7d24b22d3e48d22c91cf8636bb<\/p>\n<p style=\"text-align: center;\">1c17c39af41a5d8f54441ce6b1cf925f6727a2ee9038284a8a7071c984d0460f<\/p>\n<p style=\"text-align: center;\">b0bfe6a8aa031f7f5972524473f3e404f85520a7553662aaf886055007a57db5<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">VaporRage DLL SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"532\">\n<p style=\"text-align: center;\">readme[.]pdf<\/p>\n<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">VaporRage PDF filename<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"532\">23e20d630a8fd12600c2811d8f179f0e408dcb3e82600456db74cbf93a66e70f<\/td>\n<td width=\"148\">\n<p style=\"text-align: center;\">VaporRage PDF SHA256<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3>Endnotes<\/h3>\n<ol>\n<li><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-solarwinds-supply-chain-attack\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-solarwinds-supply-chain-attack\/<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\">https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/28\/breaking-down-nobeliums-latest-early-stage-toolset\/\">https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/28\/breaking-down-nobeliums-latest-early-stage-toolset\/<\/a><\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/teardrop-malware\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/teardrop-malware\/<\/a><\/li>\n<li><a href=\"https:\/\/www.cobaltstrike.com\/features\">https:\/\/www.cobaltstrike.com\/features<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-039b\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-039b<\/a><\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-83\/rev-1\/final\">https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-83\/rev-1\/final<\/a><\/li>\n<li><a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-court-authorized-seizure-domain-names-used-furtherance-spear\">https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-court-authorized-seizure-domain-names-used-furtherance-spear<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: James Barnett TLP: WHITE &nbsp; 1. Executive Summary Between 27 and 28 May, Microsoft published two reports on NOBELIUM, the threat actor behind the December 2020 supply chain attacks1 on SolarWinds\u2019 Orion platform. The first report detailed an ongoing spearphishing campaign that leveraged a variety of techniques to distribute a Cobalt Strike Beacon payload [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[189,32,507],"class_list":{"0":"post-6374","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-cybersecurity","9":"tag-malware","10":"tag-nobelium","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NOBELIUM Campaigns and Malware<\/title>\n<meta name=\"description\" content=\"NOBELIUM Campaigns and Malware. Between 27 and 28 May, Microsoft published two reports on NOBELIUM, the threat actor behind the December 2020 supply chain attacks1 on SolarWinds\u2019 Orion platform. The first report detailed an ongoing spearphishing campaign that leveraged a variety of techniques to distribute a Cobalt Strike Beacon payload that allows NOBELIUM to remotely control the targeted system through an encrypted network tunnel.2 The second report detailed four tools that were part of NOBELIUM\u2019s unique infection chain in that campaign: EnvyScout, BoomBox, NativeZone, and VaporRage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Advisory: NOBELIUM Campaigns and Malware\" \/>\n<meta property=\"og:description\" content=\"NOBELIUM Campaigns and Malware. Between 27 and 28 May, Microsoft published two reports on NOBELIUM, the threat actor behind the December 2020 supply chain attacks1 on SolarWinds\u2019 Orion platform. The first report detailed an ongoing spearphishing campaign that leveraged a variety of techniques to distribute a Cobalt Strike Beacon payload that allows NOBELIUM to remotely control the targeted system through an encrypted network tunnel.2 The second report detailed four tools that were part of NOBELIUM\u2019s unique infection chain in that campaign: EnvyScout, BoomBox, NativeZone, and VaporRage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-02T23:04:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cyber Threat Advisory: NOBELIUM Campaigns and Malware\",\"datePublished\":\"2021-06-02T23:04:45+00:00\",\"dateModified\":\"2024-04-26T20:20:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/\"},\"wordCount\":2806,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20.jpg\",\"keywords\":[\"Cybersecurity\",\"Malware\",\"Nobelium\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/\",\"name\":\"NOBELIUM Campaigns and Malware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20.jpg\",\"datePublished\":\"2021-06-02T23:04:45+00:00\",\"dateModified\":\"2024-04-26T20:20:39+00:00\",\"description\":\"NOBELIUM Campaigns and Malware. Between 27 and 28 May, Microsoft published two reports on NOBELIUM, the threat actor behind the December 2020 supply chain attacks1 on SolarWinds\u2019 Orion platform. The first report detailed an ongoing spearphishing campaign that leveraged a variety of techniques to distribute a Cobalt Strike Beacon payload that allows NOBELIUM to remotely control the targeted system through an encrypted network tunnel.2 The second report detailed four tools that were part of NOBELIUM\u2019s unique infection chain in that campaign: EnvyScout, BoomBox, NativeZone, and VaporRage.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-20.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/nobelium-campaigns-and-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory: NOBELIUM Campaigns and Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NOBELIUM Campaigns and Malware","description":"NOBELIUM Campaigns and Malware. Between 27 and 28 May, Microsoft published two reports on NOBELIUM, the threat actor behind the December 2020 supply chain attacks1 on SolarWinds\u2019 Orion platform. The first report detailed an ongoing spearphishing campaign that leveraged a variety of techniques to distribute a Cobalt Strike Beacon payload that allows NOBELIUM to remotely control the targeted system through an encrypted network tunnel.2 The second report detailed four tools that were part of NOBELIUM\u2019s unique infection chain in that campaign: EnvyScout, BoomBox, NativeZone, and VaporRage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Advisory: NOBELIUM Campaigns and Malware","og_description":"NOBELIUM Campaigns and Malware. Between 27 and 28 May, Microsoft published two reports on NOBELIUM, the threat actor behind the December 2020 supply chain attacks1 on SolarWinds\u2019 Orion platform. The first report detailed an ongoing spearphishing campaign that leveraged a variety of techniques to distribute a Cobalt Strike Beacon payload that allows NOBELIUM to remotely control the targeted system through an encrypted network tunnel.2 The second report detailed four tools that were part of NOBELIUM\u2019s unique infection chain in that campaign: EnvyScout, BoomBox, NativeZone, and VaporRage.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/","og_site_name":"Infoblox Blog","article_published_time":"2021-06-02T23:04:45+00:00","article_modified_time":"2024-04-26T20:20:39+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cyber Threat Advisory: NOBELIUM Campaigns and Malware","datePublished":"2021-06-02T23:04:45+00:00","dateModified":"2024-04-26T20:20:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/"},"wordCount":2806,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","keywords":["Cybersecurity","Malware","Nobelium"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/","name":"NOBELIUM Campaigns and Malware","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","datePublished":"2021-06-02T23:04:45+00:00","dateModified":"2024-04-26T20:20:39+00:00","description":"NOBELIUM Campaigns and Malware. Between 27 and 28 May, Microsoft published two reports on NOBELIUM, the threat actor behind the December 2020 supply chain attacks1 on SolarWinds\u2019 Orion platform. The first report detailed an ongoing spearphishing campaign that leveraged a variety of techniques to distribute a Cobalt Strike Beacon payload that allows NOBELIUM to remotely control the targeted system through an encrypted network tunnel.2 The second report detailed four tools that were part of NOBELIUM\u2019s unique infection chain in that campaign: EnvyScout, BoomBox, NativeZone, and VaporRage.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-20.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/nobelium-campaigns-and-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory: NOBELIUM Campaigns and Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6374"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6374\/revisions"}],"predecessor-version":[{"id":6434,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6374\/revisions\/6434"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/629"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}