Vessel Impersonation 06 05 2019

Weekly 2019 Motor Vessel (MV) & Motor Tanker (MT) Impersonation

Wapack Labs performs weekly queries of our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usage is a common lure to entice users in the maritime industry to open emails containing malicious attachments.  Wapack Labs is providing this weekly list of Motor Vessels in which Wapack Labs directly observed the vessel being impersonated, with associated malicious emails.  The identified emails attempted to deliver malware or phishing links to compromise the vessels and/or parent companies.  Users should be aware of the subject lines used and the email addresses that are attempting to deliver them.  Users should never click on or download any attachments or links in suspicious emails.

Significant Vessel Keys Words:

MT, M/T

merchant tanker

MV, M/V

merchant vessel

MY, M/Y

motor yacht

VLCC

very large crude carrier

ULCC

ultra large crude carrier

RV, R/V

research vessel

FPSO

floating production storage & offloading

Figure 1.  Geo-location of receiving IPs of the malicious emails. Location is not exact and is approximate location of the receiving IP gathered from Wapack Lab’s malicious email collection.

Figure 2. Geo-location of sender IPs of the malicious emails. Location is not exact and is approximate location of the sender IP gathered from Wapack Lab’s malicious email collection.

Table 1: List of subject lines, motor vessel, type of malware sent and sender data that was seen in Wapack Lab’s malicious email collection from May 28, 2019 to June 5, 2019.

 

First Seen

 

Subject Line Used

 

Malware Detections

 

Sending Email

 

Targets

May 28th, 2019

MV. OCEAN PEACE

 

Sophos - Troj/RtfExp-EX

 

ZoneAlarm - HEUR:Exploit.RTF.Oleink.gen

 

FireEye - Trojan.GenericKD.32007608

 

Cyren - CVE-2017-11882.C.gen!Camelot

 

MAX - malware (ai score=83)

 

TrendMicro - Trojan.W97M.CVE201711882.PVSCV

 

COSCO(Shanghai) Shipyard

<zhangxaoyong@cosco-shipyard.com>

hmsfeex101.hmsfe.net

 

hmsfareast.com

 

atlas02.gates2host.com

 

cosco-shipyard.com

May 28th, 2019

MV TATRY - loading, Agency appointment & PDA

Fortinet - VBS/Agent.AQA!tr

 

Rising - Exploit.CVE-2017-8570!1.AFC6 (CLASSIC)

 

ZoneAlarm - HEUR:Exploit.MSOffice.Generic

 

Microsoft - Trojan:Win32/Ludicrouz.O

 

NANO-Antivirus -

Exploit.Rtf.Heuristic-rtf.dinbqn

 

 

PANOCEAN <jayden@panocean.com>

schaar-niemeyer.com.sg

 

panocean.com

 

hmsfeex101.hmsfe.net

 

hmsfareast.com

 

Hotmail.com

May 28th, 2019

(Agency Appointment) - MV CHS SPLENDOR V96 - Disport

MAX - malware (ai score=88)

 

DrWeb - LNK.Downloader.92 -

 

Troj/DownLnk-X - Sophos

 

BitDefender - Gen:Heur.BZC.YAX.Nioc.1.03EFB6D5

 

MicroWorld-eScan -Gen:Heur.BZC.YAX.Nioc.1.03EFB6D5 -

 

COSCO Shipping Co <a02@155006a2c6c.com>

30718da8.eg

May 29th, 2019

MV GRAND DEMETER V.19S03-- FRT INV

Rising - Trojan.Lokibot!8.F1B5 (CLOUD)

 

Arcabit - HEUR.ExecInMail

 

McAfee - Artemis!A626D8FC9D6F

 

Microsoft - Trojan:Win32/Lokibot.A!MTB

SHIPPING <tsl-group.com>

<ilseong0830@nate.com>

mxb.w3iemail.com

 

tsl-group.com

 

mail.ligabue.it

 

ligabue.it

 

nate.com

 

May 30th, 2019

MV VIRONY AGENCY APPOINTMENT

Kaspersky - HEUR:Trojan-Downloader.Script.Generic

 

AhnLab-V3 - RTF/Downloader.S2

 

Ad-Aware - Exploit.RTF-ObfsStrm.Gen

 

McAfee - Exploit-CVE2017-8570.d

 

TrendMicro - HEUR_RTFMALFORM

 

Rising - Exploit.CVE-2017-8570!1.AFC6 (CLASSIC)

 

McAfee-GW-Edition - Exploit-C

 

SEATRANS MARINE PVT LTD. <seatrans.chennai@seatrans.co.in>

schaar-niemeyer.com.sg

 

hmsfeex101.hmsfe.net

 

hmsfareast.com

 

seatrans.co.in

About Wapack Labs

Wapack Labs, located in New Boston, NH.  We are a Cyber Threat Analysis and Intelligence organization supporting the Red Sky Alliance, the FS-ISAC, and individual corporations by offering expert level targeted intelligence analysis answering some of the hardest questions in Cyber. Wapack Labs’ engineers, researchers, and analysts design and deliver transformational cyber-security analysis tools that fuse open source and proprietary information, using deep analysis techniques and visualization. Information derived from these tools and techniques serve as the foundation of Wapack Labs’ information reporting to the cyber-security teams of its customers and industry partners located around the world.  For questions or comments regarding this report, please contact the lab directly by at 1-844-492-7225, or feedback@wapacklabs.com.

You need to be a member of Red Sky Alliance to add comments!