Skip to content
Try it Free Request Your Demo
    December 11, 2021

    Q3 Quarterly Threat Bulletin

    The Uptycs threat research team regularly monitors the TTPs (tactics, techniques and procedures) of the latest malware using our threat intelligence sources and systems. Organisations can use this bulletin as a tool to evaluate and form a more robust detection and protection posture against the latest threats in Windows, Linux and macOS platforms.

     

    The threat bulletin covers several aspects, such as:

     

    1. Techniques used by the malware samples in our threat intel sources
    2. Commonly abused commands and utilities in Windows, Linux and macOS platforms
    3. Top prevalent malware families in the wild for Windows, Linux and macOS platforms
    4. Uptycs Threat Research articles published by the threat research team
    5. Threat actors observed for the quarter
    6. Malware/targeted attacks for the quarter
    7. Vulnerabilities/exploits in Windows, Linux and macOS platforms
    8. General recommendations based on our observations

     

    The key highlights of our recently published Q3 threat bulletin are: 

     

    1. In this latest quarter (July - September 2021), we observed the following prevalent malware:

      1. Loki and Warzone RAT are the prevalent malware in Q3 for Windows platforms, taking that spot from Agent Tesla and Qbot in Q2.

      2. XorDDOS is the most prevalent malware for Linux. Mirai continues to be seen in Q3 as well with small numbers of Gafgyt. 

      3. Shlayer & Bundlore are still in action during Q3 on macOS.

    2. A majority of Loki malware and AgentTesla leveraged the EQNEDT32.exe Windows utility with decoy documents in the Execution phase of the attack lifecycle.

    3. Threat actor activity of APT31, APT41, FIN8, SharpPanda, InkySquid, Lyceum, Praying Mantis and DarkOxide have been reported in the news.

    4. REvil and DarkSide Ransomware gangs are in the limelight actively performing attacks on corporate entities, as reported in the news.

    5. Windows Print Spooler Remote Code Execution Vulnerability (PrintNightmare) is being leveraged by threat actors in malware attacks.

    6. Critical vulnerabilities in IOT devices like CVE-2021-31755, CVE-2021-1497, CVE-2021-22502 were targeted by some of the active variants of Mirai.

     

    An excerpt of the Commonly abused commands and utilities in Windows, Linux and macOS platforms is shown below.

     

     

    For a more detailed report of our key highlights of the Q3 threat bulletin, visit this link to download the report.

     

     

    Uptycs Threat Research

    Research and updates from the Uptycs Threat Research team.

    Other posts you might be interested in