Vessel Impersonation 07 10 2019

3263209008?profile=RESIZE_710xWeekly 2019 Motor Vessel (MV) & Motor Tanker (MT) Impersonation

Wapack Labs performs weekly queries of our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usage is a common lure to entice users in the maritime industry to open emails containing malicious attachments.  Wapack Labs is providing this weekly list of Motor Vessels in which Wapack Labs directly observed the vessel being impersonated, with associated malicious emails.  The identified emails attempted to deliver malware or phishing links to compromise the vessels and/or parent companies.  Users should be aware of the subject lines used and the email addresses that are attempting to deliver them.  Users should never click on or download any attachments or links in suspicious emails.

MT, M/T

merchant tanker

MV, M/V

merchant vessel

MY, M/Y

motor yacht

VLCC

very large crude carrier

ULCC

ultra large crude carrier

RV, R/V

research vessel

FPSO

floating production storage & offloading

Significant Vessel Keys Words:

3263158805?profile=RESIZE_710xFigure 1.Geo-location of receiving IPs of the malicious emails. Location is not exact and is approximate location of the receiving IP gathered from Wapack Lab’s malicious email collection.

3263168208?profile=RESIZE_710xFigure 2. Geo-location of sender IPs of the malicious emails. Location is not exact and is approximate location of the sender IP gathered from Wapack Lab’s malicious email collection.

Table 1: List of subject lines, motor vessel, type of malware sent and sender data that was seen in Wapack Lab’s malicious email collection from July 3, 2019 to July 10, 2019.

 

First Seen

 

Subject Line Used

 

Malware Detections

 

Sending Email

 

Targets

July 4th, 2019

MV ALPHA TRADE- PDA REQUIRED FOR LOADING TANKER

Arcabit - Trojan.Zmutzy.802

 

Cyren - W32/VBInject.XR.gen!Eldorado

 

MicroWorld-eScan - Trojan.Zmutzy.802

 

Rising - Trojan.Injector!1.B459 (CLASSIC)

 

MAX - malware (ai score=88)

 

Microsoft - Trojan:Win32/Wacatac.B!ml

742bd91d@82764420ab0ef.es

No reported targets

July 4th, 2019

CTM FOR / MT. WOOJIN EVELYN

FireEye - Exploit.SpamMalware-RAR.Gen

 

Rising - Trojan.Injector!1.B459 (CLASSIC)

 

GData - Exploit.SpamMalware-RAR.Gen

 

BitDefender - Exploit.SpamMalware-RAR.Gen

 

Arcabit - Exploit.SpamMalware-RAR.Gen

\"OJS / yg yun\" <e6d@dbc1a5d41bd09.kr>

spetsflot.pro

 

bestmarine.co.kr

 

totalsupporttravel.com

 

thanglongmarine.com

 

ktweb.co.kr

 

starbulk.com

 

samplelogistics.com

 

juhoshipping.co.kr

July 4th, 2019

M/V EFI THEO - Order - KWON- SP/ET/035-19

Arcabit - Trojan.Zmutzy.802

 

Cyren - W32/Trojan.SW.gen!Eldorado

 

Ikarus - Trojan.MSIL.Injector

 

F-Prot - W32/Trojan.SW.gen!Eldorado

 

MAX - malware (ai score=81)

 

BitDefender - Trojan.Zmutzy.802

 

Sophos - Trojan.Zmutzy.802 - FireEye

=?UTF-8?Q?=EC=84=9C=EA=B0=80=EC=9B=90?= <3868174f@7ca1d3.kr>

 

56563f.com

 

d4bd7686096.com

 

July 4th, 2019

MV BARROW ISLAND 04072019

BitDefender - Trojan.Zmutzy.802

 

MAX - malware (ai score=84)

 

Rising - Trojan.Injector!1.B459 (CLASSIC)

 

FireEye - Trojan.Zmutzy.802

 

Microsoft - Trojan:Win32/Fuerboos.C!cl

 

Arcabit - Trojan.Zmutzy.802

\"LH SHIPPING PTE. LTD. (SINGAPORE)\" <eb023fac63@b47d857da961d.com>

 

spin.electroputere.ro

 

iaxntelecom.com

 

lafargeholcim.com

July 4th, 2019

MV SABRINA CART TRANSIT, CTM //

Emsisoft - Exploit.CVE-2017-11882.Gen (B)

 

Antiy-AVL - Trojan[Exploit]/OLE.CVE-2017-11882

 

Ikarus - Exploit.CVE-2017-11882

 

Zoner - Probably W97NativeOnly

 

BitDefender - Exploit.CVE-2017-11882.Gen

Pacific Basin Shipping (HK) Limited  <ba19a09a68@d418e903a481.com>

 

30718da8.eg

July 5th, 2019

MV DA TAI V32----AGENCY\'S APPOINTMENT                   

MicroWorld-eScan - Gen:Variant.Razy.527991

 

Avira - TR/Kryptik.ngfmg

 

Ikarus - Win32.SuspectCrc

 

Emsisoft - Gen:Variant.Razy.527991 (B)

 

Cyren - W32/VBInject.YB.gen!Eldorado

 

Sophos - Mal/Generic-S,

 

AVG - Win32:CrypterX-gen [Trj]

 

 

\"COSCO Shipping Specialized Carriers Co.Ltd  \" <078adcca@6a68cebaf9.cn>

No reported targets

About Wapack Labs

Wapack Labs is located in New Boston, NH.  We are a Cyber Threat Analysis and Intelligence Service organization.  For questions, comments or assistance, please contact the lab directly at 1-844-492-7225, or feedback@wapacklabs.com.

You need to be a member of Red Sky Alliance to add comments!