<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom Signature Request for Recent Malicious Healthcare Activity (Per FBI) in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/custom-signature-request-for-recent-malicious-healthcare/m-p/2148#M46</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In case you didn't see it, this was added in update 453 (ID &lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;13540&lt;/SPAN&gt;).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Oct 2014 19:45:06 GMT</pubDate>
    <dc:creator>justamoment</dc:creator>
    <dc:date>2014-10-02T19:45:06Z</dc:date>
    <item>
      <title>Custom Signature Request for Recent Malicious Healthcare Activity (Per FBI)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/custom-signature-request-for-recent-malicious-healthcare/m-p/2147#M45</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, we received the following from the FBI. Can you help us create a custom signature? Thanks&lt;/P&gt;&lt;P&gt;Seth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a snort signature for this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;alert tcp any any -&amp;gt; any any (content:"|6E|"; depth: 1; content:"|36 36 36 58 36 36 36|"; offset: 3; depth: 7; msg: "Beacon C2"; sid: 1000000001; rev:0) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;P align="center" style="margin-bottom: .0001pt; text-align: center;"&gt;&lt;SPAN style="color: black;"&gt;UNCLASSIFIED &lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;P align="center" style="margin-bottom: .0001pt; text-align: center;"&gt;&lt;SPAN style="color: black;"&gt;FBI FLASH &lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;FBI Liaison Alert System &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;#A-000039-TT &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;The following information was obtained through FBI investigation and is provided in conjunction with the FBI's statutory requirement to conduct victim notification as outlined in 42 USC § 10607. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: black;"&gt;SUMMARY &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;The FBI is providing the following information with HIGH confidence. The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII). These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: black;"&gt;TECHNICAL DETAILS &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;The FBI has received the following information pertaining to a recent intrusion into a health care system that resulted in data exfiltration. Though the initial intrusion vector is unknown, we believe that a spear phish email message was used to deliver the initial malware. Typically, these actors use Information Technology themed spear-phishing messages which contain a malicious link that may connect to a new VPN site/service/client or a new Webmail site/software. Once access is obtained, the actors may collect and use legitimate account credentials to connect to the targeted system, usually through VPN.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;The following are indicators of possible compromise: &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: black;"&gt;Network-Based Indicator&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;Outgoing traffic through standard HTTP/HTTPS ports 80, 443 (and possibly others), but obfuscates traffic by XORing the traffic with 0x36. The below is a SNORT signature related to this activity: &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;alert tcp any any -&amp;gt; any any (content:"|6E|"; depth: 1; content:"|36 36 36 58 36 36 36|"; offset: 3; depth: 7; msg: "Beacon C2"; sid: 1000000001; rev:0) &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: black;"&gt;Host-Based Indicator &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;The malware runs as a Windows service "RasWmi (Remote Access Service)" from the malicious .dll C:\Windows\system32\wbem\raswmi.dll. The implant is installed from an executable file (the file has been observed under a variety of names) which drops the raswmi.dll file into the same directory and sets it to run as a service. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: black;"&gt;POINT OF CONTACT &lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;Please contact the FBI with any questions related to this FLASH report at either your local CTF or FBI CYWATCH: Email: &lt;A href="mailto:cywatch@ic.fbi.gov"&gt;cywatch@ic.fbi.gov&lt;/A&gt; or Voice: +1-855-292-3937 &lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Aug 2014 19:56:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/custom-signature-request-for-recent-malicious-healthcare/m-p/2147#M45</guid>
      <dc:creator>SethF</dc:creator>
      <dc:date>2014-08-21T19:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Signature Request for Recent Malicious Healthcare Activity (Per FBI)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/custom-signature-request-for-recent-malicious-healthcare/m-p/2148#M46</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In case you didn't see it, this was added in update 453 (ID &lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;13540&lt;/SPAN&gt;).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Oct 2014 19:45:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/custom-signature-request-for-recent-malicious-healthcare/m-p/2148#M46</guid>
      <dc:creator>justamoment</dc:creator>
      <dc:date>2014-10-02T19:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Signature Request for Recent Malicious Healthcare Activity (Per FBI)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/custom-signature-request-for-recent-malicious-healthcare/m-p/125405#M1286</link>
      <description>&lt;P&gt;&lt;SPAN&gt;If &amp;nbsp;a signature didn't exist on the PA, how would you cover this snort signature to a PA custom pattern match?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Snort:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;alert tcp any any -&amp;gt; any any (content:"|6E|"; depth: 1; content:"|36 36 36 58 36 36 36|"; offset: 3; depth: 7&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;PA Pattern:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 22:04:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/custom-signature-request-for-recent-malicious-healthcare/m-p/125405#M1286</guid>
      <dc:creator>HYamanaka</dc:creator>
      <dc:date>2016-11-09T22:04:00Z</dc:date>
    </item>
  </channel>
</rss>

