Kronos Malware Reemerges with Increased Functionality

Kronos malware has reemerged with increased functionality and is now observed alongside ransomware, with activity reported in Mexico. IBM Security Trusteer warns the campaign could spread to North America and Europe, urging stronger email filtering and offline remediation. #Kronos #Trusteer #Mexico #Ransomware

Keypoints

  • Kronos malware reemerges with increased functionality and is observed in conjunction with ransomware.
  • IBM Security Trusteer has observed the activity in Mexico.
  • The campaign is suspected to potentially spread to North America and Europe.
  • Phishing emails are used as part of the attack pattern, underscoring the need for email filtering and security measures to block malicious emails.
  • If a system is infected, offline remediation and thorough scans with antivirus/anti-malware tools are advised, along with changing compromised data.
  • Public guidance emphasizes awareness and protective actions across regions to mitigate the threat.

MITRE Techniques

  • [T1566.001] Spearphishing – Uses phishing emails to deliver Kronos; “phishing emails, and organizations should implement email filtering and other security measures to block malicious emails.”
  • [T1486] Data Encrypted for Impact – Ransomware component accompanies Kronos; “this time combined with ransomware.”
  • [T1562] Impair Defenses – Advanced functionality and ability to evade detection described in the article; “Due to its advanced functionality and ability to evade detection.”

Indicators of Compromise

  • [IOC Type] No specific IOCs mentioned – no IP addresses, file hashes, domains, or file names are provided in the article

Read more: https://securityintelligence.com/kronos-malware-reemerges-increased-functionality/?c=Threat%20Research