mv glory sea - Transportation - Red Sky Alliance
2024-03-29T02:05:04Z
https://redskyalliance.org/transportation/feed/tag/mv+glory+sea
Vessel Impersonation 03 12 2019
https://redskyalliance.org/transportation/vessel-impersonation-03-12-2019
2019-03-12T16:46:32.000Z
2019-03-12T16:46:32.000Z
Bill Schenkelberg
https://redskyalliance.org/members/BillSchenkelberg
<div><p>Wapack Labs performs weekly queries of our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usage is a common lure to entice users in the maritime industry to open emails containing malicious attachments.  Wapack Labs is providing this weekly list of Motor Vessels in which Wapack Labs directly observed the vessel being impersonated, with associated malicious emails.  The identified emails attempted to deliver malware or phishing links to compromise the vessels and/or parent companies.  Users should be aware of the subject lines used and the email addresses that are attempting to deliver them.  Users should never click on or download any attachments or links in suspicious emails.</p>
<p><strong>Significant Vessel Keys Words:</strong></p>
<table width="378">
<tbody>
<tr>
<td width="84">MT, M/T</td>
<td width="294">
<p>merchant tanker</p>
</td>
</tr>
<tr>
<td width="84">
<p>MV, M/V</p>
</td>
<td width="294">
<p>merchant vessel</p>
</td>
</tr>
<tr>
<td width="84">
<p>MY, M/Y</p>
</td>
<td width="294">
<p>motor yacht</p>
</td>
</tr>
<tr>
<td width="84">
<p>VLCC</p>
</td>
<td width="294">
<p>very large crude carrier</p>
</td>
</tr>
<tr>
<td width="84">
<p>ULCC</p>
</td>
<td width="294">
<p>ultra large crude carrier</p>
</td>
</tr>
<tr>
<td width="84">
<p>RV, R/V</p>
</td>
<td width="294">
<p>research vessel</p>
</td>
</tr>
<tr>
<td width="84">
<p>FPSO</p>
</td>
<td width="294">
<p>floating production storage & offloading</p>
</td>
</tr>
</tbody>
</table>
<p><strong><a href="{{#staticFileLink}}1389540623,original{{/staticFileLink}}" target="_blank" rel="noopener"><img class="align-full" src="{{#staticFileLink}}1389540623,RESIZE_710x{{/staticFileLink}}" width="506" height="158" /></a></strong>Figure 1.  Geo-location of receiving IPs of the malicious emails. Location is not exact and is approximate location of the receiving IP gathered from Wapack Lab’s malicious email collection.</p>
<p><a href="{{#staticFileLink}}1389547726,RESIZE_710x{{/staticFileLink}}" target="_blank" rel="noopener"><img class="align-full" src="{{#staticFileLink}}1389547726,RESIZE_710x{{/staticFileLink}}" width="505" height="304" /></a>Figure 2. Geo-location of sender IPs of the malicious emails. Location is not exact and is approximate location of the sender IP gathered from Wapack Lab’s malicious email collection.</p>
<p><a href="{{#staticFileLink}}1389663504,RESIZE_1200x{{/staticFileLink}}" target="_blank" rel="noopener"><img class="align-full" src="{{#staticFileLink}}1389663504,RESIZE_710x{{/staticFileLink}}" width="463" height="255" /></a><em>Table 1 below: List of subject lines, motor vessel, type of malware sent and sender data that was seen in Wapack Lab’s malicious email collection from March 5, 2019 to March 12, 2019.</em></p>
<table style="width: 449px;" width="720">
<tbody>
<tr>
<td style="width: 89px;" width="72">
<p><strong> </strong></p>
<p><strong>First Seen</strong></p>
</td>
<td style="width: 115px;" width="84">
<p><strong> </strong></p>
<p><strong>Subject Line Used</strong></p>
</td>
<td style="width: 10px;" width="228">
<p><strong> </strong></p>
<p><strong>Malware Detections</strong></p>
</td>
<td style="width: 155px;" width="150">
<p><strong> </strong></p>
<p><strong>Sending Email</strong></p>
</td>
<td style="width: 80px;" width="186">
<p><strong> </strong></p>
<p><strong>Targets</strong></p>
</td>
</tr>
<tr>
<td style="width: 89px;" width="72">
<p>March 6th 2019</p>
</td>
<td style="width: 115px;" width="84">
<p>VSL: MV Glory Sea</p>
</td>
<td style="width: 10px;" width="228">
<p>Ad-Aware - Trojan.GenericKD.41071394</p>
<p> Avast - Win32:Malware-gen</p>
<p> Arcabit - Trojan.Generic.D272B322</p>
<p> AVG - Win32:Malware-gen</p>
<p> Qihoo-360 - susp.rtf.objupdate.gen</p>
<p> Kaspersky - HEUR:Exploit.MSOffice.Generic</p>
<p> Avira - W97M/Abnormal.vvvng</p>
<p> </p>
</td>
<td style="width: 155px;" width="150">
<p>PT INTER ORIENT LOGISTICS <bali.sales2@eml-net.com></p>
</td>
<td style="width: 80px;" width="186">
<p>hk2apc01ft003.eop-apc01.prod.protection.outlook.com</p>
<p> sg2pr06ca0165.apcprd06.prod.outlook.com</p>
<p> hk2apc01ft003.mail.protection.outlook.com</p>
<p> apc01-hk2-obe.outbound.protection.outlook.com</p>
<p> sg2apc01ft041.eop-apc01.prod.protection.outlook.com</p>
<p> sg2apc01ft024.mail.pro</p>
</td>
</tr>
<tr>
<td style="width: 89px;" width="72">March 6th 2019</td>
<td style="width: 115px;" width="84">
<p>Request for Quotation-MV DAE WON</p>
<p> </p>
</td>
<td style="width: 10px;" width="228">
<p>Ikarus - Trojan-Downloader.VBA.Agent</p>
<p> ESET-NOD32 - VBA/TrojanDownloader.Agent.MYV</p>
<p> Fortinet - VBA/Agent.DPFP!tr.dldr</p>
<p> GData - VB:Trojan.Agent.DQUZ</p>
<p> Avira - TR/Dldr.Script.jdntx</p>
<p> Emsisoft - VB:Trojan.Agent.DQUZ (B)</p>
<p> Ad-Aware - VB:Trojan.Agent.DQUZ</p>
</td>
<td style="width: 155px;" width="150">
<p>Prima Marine Public Company Limited <shipping@primamarine.co.th></p>
</td>
<td style="width: 80px;" width="186">
<p>primamarine.co.th</p>
<p> spin.electroputere.ro</p>
<p> electroputere.ro</p>
<p> zenith.infortelecomhosting.com</p>
</td>
</tr>
<tr>
<td style="width: 89px;" width="72">
<p>March 6th 2019</p>
</td>
<td style="width: 115px;" width="84">
<p>MV OCEAN WAVE 9 - BUNKER INVOICE</p>
<p> </p>
</td>
<td style="width: 10px;" width="228">
<p>Kaspersky - HEUR:Exploit.MSOffice.Generic</p>
<p> Avira - W97M/Abnormal.olerf</p>
<p> Rising - Trojan.Kryptik!8.8/N3#88% (RDM+:cmRtazqprUoNkVIfCVpmhel3e3ZQ)</p>
<p> MicroWorld-eScan - Exploit.CVE-2018-0802.Gen</p>
<p> TrendMicro-HouseCall - TROJ_FRS.0NC106C619</p>
<p> </p>
</td>
<td style="width: 155px;" width="150">
<p>G-WORLDLINE <kwl@G-worldline.com></p>
<p> </p>
</td>
<td style="width: 80px;" width="186">
<p>g-worldline.com</p>
<p> barsyl.in</p>
<p> airlive.com</p>
<p> </p>
</td>
</tr>
<tr>
<td style="width: 89px;" width="72">
<p>March 7th 2019</p>
</td>
<td style="width: 115px;" width="84">
<p>Fwd: MV HTK NEPTUNE</p>
<p> </p>
</td>
<td style="width: 10px;" width="228">
<p>McAfee - Exploit-CVE2017-11882.aj</p>
<p> F-Secure -Malware.W97M/Abnormal.dkaaw</p>
<p> Kaspersky -HEUR:Exploit.MSOffice.Generic</p>
<p> Sophos - Troj/RtfExp-EV</p>
<p> GData - Exploit.CVE-2018-0802.Gen</p>
<p> DrWeb - Trojan.PWS.Stealer.25784</p>
<p> Avira - W97M/Abnormal.dkaaw</p>
</td>
<td style="width: 155px;" width="150">
<p>Missiouriov Maxim <MMissiouriov@toyotatt.ru></p>
</td>
<td style="width: 80px;" width="186">
<p>bc-exch-cas1.int.businesscar.ru</p>
<p> toyotatt.ru</p>
<p> cosco-ogs.com</p>
<p> business-car.ru</p>
<p> </p>
</td>
</tr>
<tr>
<td style="width: 89px;" width="72">
<p>March 7th 2019</p>
</td>
<td style="width: 115px;" width="84">
<p>Fwd: MV HTK NEPTUNE</p>
</td>
<td style="width: 10px;" width="228">
<p>malware (ai score=88) - MAX,</p>
<p> HEUR:Exploit.MSOffice.Generic - Kaspersky,</p>
<p> Exploit.CVE-2018-0802.Gen - MicroWorld-eScan,</p>
<p> Mal_HPGen-37b - TrendMicro-HouseCall,</p>
<p> a variant of DOC/Abnormal.H - ESET-NOD32,</p>
<p> Exploit.CVE-2018-0802.Gen - GData,</p>
<p> RTF/Agent - AhnLab-V3,</p>
</td>
<td style="width: 155px;" width="150">
<p>Postverteiler <pm@hoffmanneitle.com></p>
</td>
<td style="width: 80px;" width="186">
<p>hoffmanneitle.com</p>
<p> </p>
</td>
</tr>
<tr>
<td style="width: 89px;" width="72">
<p>March 7th 2019</p>
</td>
<td style="width: 115px;" width="84">
<p>MT OCEAN STAR ISO 8217 2005</p>
<p> </p>
</td>
<td style="width: 10px;" width="228">
<p>BitDefender -Gen:Variant.Razy.474858</p>
<p> Fortinet - W32/GenKryptik.DBTA!tr</p>
<p>MAX - malware (ai score=84)</p>
<p> Invincea - heuristic</p>
<p> DrWeb - Trojan.PWS.Stealer.23680</p>
<p> VBA32 - BScope.Trojan.VBKryjetor</p>
<p> AegisLab -Trojan.Win32.Generic.4!c</p>
</td>
<td style="width: 155px;" width="150">
<p>George, America ship.,co <george.ogn@amshipco.com></p>
</td>
<td style="width: 80px;" width="186">
<p> </p>
</td>
</tr>
</tbody>
</table>
<p><strong>About Wapack Labs</strong></p>
<p>Wapack Labs, located in New Boston, NH, is a Cyber Threat Analysis and Intelligence organization supporting the Red Sky Alliance, the FS-ISAC, and individual corporations.  For questions or comments regarding this report, please contact the lab directly by at 1-844-492-7225, or <a href="mailto:feedback@wapacklabs.com">feedback@wapacklabs.com</a></p>
</div>