8121215875?profile=RESIZE_400xRed Sky Alliance performs weekly queries of our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usage is a common lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is providing this weekly list of Motor Vessels in which Red Sky Alliance directly observed the vessel being impersonated, with associated malicious emails.  The identified emails attempted to deliver malware or phishing links to compromise the vessels and/or parent companies.  Users should be aware of the subject lines used and the email addresses that are attempting to deliver the messages.

Significant Vessel Keys Words:

8121160264?profile=RESIZE_710x

 

 

 

 

 

8121164883?profile=RESIZE_584x

Figure 1 - Geo-location of sender IPs of the malicious emails. The location is not exact and is the approximate location of the sender IP gathered from Red Sky Alliance’s malicious email collection.

 8121188252?profile=RESIZE_584x

Figure 2- Geo-location of receiving IPs of malicious emails. The location is not exact and is the approximate location of the receiving IP gathered from malicious email collection.

 

Table 1: List of subject lines, motor vessel, type of malware sent, and sender data that was seen in Red Sky Alliance’s malicious email collection from 24 October 2020 to 31 October 2020.

 

First Seen

 

Subject Line Used

 

Malware Detections

 

Sending Email

 

Targets

Oct 26, 2020

RE: Arrival Notice and Port Clear BL#SE20100078/001

HEUR:Exploit.MSOffice.CVE-2017-0199.a

“Maersk Notification” <servlce@maersk.com>

Targets Not Dislosed

Oct 26, 2020

Request for Freight Quote.

Exploit:O97M/CVE-2017-0199.JK!MTB

“Evershining International Shipping Agency” <khalid@paddocksjeans.com>

Targets Not Dislosed

Oct 26, 2020

M/V MARZUK/ PDA

Trojan:Win32/FormBook.SS!MTB

Seahorse Maritime <opseahorse@maritime.ro>

kbkha.ru

Oct 26, 2020

Invoice From Leelloyds Marine Engineering Pte Ltd

HEUR:Trojan-Dropper.Java.Agent.gen

"Leelloyds@Singnet" <db6ce4@81e00a5b.com>

Targets Not Dislosed

Oct 27, 2020

MV PRABHU SAKHAWAT

TrojanDownloader:O97M/Donoff.RF!MTB

Wilhelmsen Ships Service <3fb1537e3c0@d8b31b9ec9.com>

963212c1fc.com

Oct 27, 2020

RE:Revised Inquiry Ships,boats

Trojan-Downloader.MSWord.Agent.buh

"Mrs Amira Rasheedi" <21232@f6a9f5dd64.ga>

f6a9f5dd64.ga

Oct 27, 2020

WG: Order Confirmation : Rfq: //TOP URGENT// Quote for Rio de Janeiro Ports/Terminals -Brazil

HTML/Agent.AQX!tr

Zentrale <info@schuch.de>

schuch.de

Oct 27, 2020

M/V  PLATIN SHIPPING TBN//  EPDA & PORT INFO REQUEST  FOR LOADING ABT 60,325 MTNS OF UREA IN BULK

Trojan:Script/Foretype.A!ml

Platin Shipping

Trading Co <f7235a61f@3ae52877e0.net>

5d104289d17.za

Oct 27, 2020

RE: MSC-Notice of Arrival for MSC B/L :MEDUAU647809/MSC ADITI/HC039A

PWS:Win32/Fareit!ml

"MSC - Mediterranean Shipping Company (Europe)"

<saigonsan@tuguhotels.com>

msc.com

Oct 27, 2020

MV GRAECIAAETERNA-DISCHARGING OPERATION-60,000/10 MTS SBS

TrojanDownloader:O97M/Donoff.RF!MTB

Cofco International Freight S.A.<Elif 286c67@78569d273040d420ad.com>

30718da8.eg

Oct 27, 2020

Dredger (TSHD) \'mv GANG JUN 12,000 cbm/2013 FOR SALE/CHARTER

Trojan:Win32/Wacatac.C!ml

"MaxBridge-Mike[snp@max-bridge.com" <1812@0102366483ea15.tw>

0102366483ea15.tw

Oct 28, 2020

MV. SWEET LYDIA  / Shanghai / Disc Wheat - Agency Appointment

Exploit:O97M/CVE-2017-0199.YT!MTB

lourdes@blg.co.id

Targets Not Disclosed

Oct 28, 2020

MAERSK LINE STATEMENT OF ACCOUNT  OCTOBER 2020

Trojan:Win32/Woreflint.A!cl

Lily Yan<yan.chen@maersk.com>

edlw.ru

Oct 28, 2020

PFDA & PORT INFO REQUEST

Exploit:Win32/CVE-2017-11882!ml

DA Dept.Roxana Shipping CO.LTD<5c@e5fa59af818d8a.com>

2856d7ee3c.com

Oct 29, 2020

RE: [PS3] HMM VESSEL CALLING TC-HICT ON 06TH JUL @ HYUNDAI SINGAPORE

TrojanDownloader:O97M/Emotet.CSK!MTB

Pham Cong Minh <qualidade@tecnoval.ind.br>

hmm21.com

Oct 29, 2020

Re: MV HAPPINESS Tuticorin/V037/CONTRACT EXTENSION (EXTENDING CONTRACT)

Trojan:Win32/Wacatac.D5!ml

"HAPPINESS HAMID (CR)" <283e9319692f9e@a11723170a.com>

a82c8142cedb2da.com

Oct 29, 2020

FW: RE: RE: SEAI2009017 URGENT & FREIGHT DELAY

Exploit:O97M/CVE-2017-0199.RVA!MTB

"Silvi Lydiai" <caf9@6f20f7a90.com>

589ab18.com

Oct 30, 2020

=?utf-8?B?W+aKleizh+S6uuacjeWLmV0=?= Re: Bulk Cargo Shipment for ir@hannstar.com  =?UTF-8?B?Ly/pgpPpkqfmloc=?=

Exploit:O97M/CVE-2017-11882!MTB

“Chen Xin” <felix.chen@longsailing.net>

hannstar.com

Oct 30, 2020

Nova Container Dispatch

TrojanDownloader:O97M/Emotet.CSK!MTB

“Mark Saldanha” <mark.s@marksanspharma.com>

marksanspharma.com

Oct 30, 2020

EPDA & PORT INFO REQUEST  MV TBN

Exploit:Win32/CVE-2017-11882!ml

“M/V PLATIN SHIPPING.”

<f7235a61f@3ae52877e0.net>

b71649.com

Oct 30, 2020

RE: MV TEAL BULKER afloating repair at PaxOcean Batam shipyard

Trojan:Win32/Wacatac.DD!ml

Pedro Ortiz Malave <c6cc8@e07e63d71eb9.com>

Targets Not Disclosed

Oct 30, 2020

MV PVTRANS OIL // INQUIRY PORT INFO & EPDA FOR DISCH.  30,325 MTNS OF UREA

HEUR:Trojan-Downloader.VBS.Agent.gen

Phuong Dong Viet Oil Transportation Joint Stock Company (PVTRANS OIL)<1d1d57@3051320ea530d.vn>

885f644a8.com

Oct 30, 2020

Request for Quotation : [RFQ} MV NYK#574499000

Exploit:O97M/CVE-2017-0199.BK!MTB

"Anna(Ms) / Assistant manager Business Management Team David E C" <business@hmmco.co.kr>

Targets Not Disclosed

Oct 31, 2020

Cargo Arrival Notice: BL No COSU6271832430

Trojan:JS/Phish.RVD!MTB

"Maersk" <arrival@maersk.com>

automationit.com

Oct 31, 2020

RE: HHMR - SAILING REPORT KAN VOY.022W

HEUR:Trojan.MSOffice.SAgent.gen

Hyundai Mars <alberto.pena@tya.com.mx>

hmm21.com

Figure 3 - Marine Traffic results for MV GRAECIA AETERNA

 

In the above collection, we see malicious actors attempting to use vessel names to try to spoof companies in the maritime supply chain.  This week we observed a wide variety of maritime-related subject lines.  Some of the new vessel names used this week include “MV Happiness” and “MV Marzuk” among others.

Analysts observed malicious subject line, “RE: MSC-Notice of Arrival for MSC B/L :MEDUAU647809/MSC ADITI/HC039A” used this week.  Attackers routinely use shipping company-names in subject lines, to entice the target into opening the malicious emails and activating malware.  In this case, attackers are using “MSC,” commonly an abbreviation for Mediterranean Shipping Company.

The sending address in this case impersonated an employee from the major shipping giant using the sending alias “"MSC - Mediterranean Shipping Company (Europe)."  A closer look would show that the sending email address is saigonsan[at]tuguhotels[.]com which does not appear to be a legitimate email.  The address has been observed impersonating numerous different entities to send malicious emails.[1]

The target of the email is a tax officer at MSC.  The message body of the email indicates that the email sender does not speak English as their native language, which is not suspicious individually, but there are other indications that this is not a legitimate request.  The email uses the generic greeting “Dear Info” which is slightly suspicious, as the targeted recipient is not “info[at]msc.com.”  Another suspicious aspect of the email is the signature, assigned, “Best Regards, Finance Staff as Agent” and then lists the full MSC company name in the next line.  The picture shown right below the signature includes an image saying “MORE INFO”, but this is just an image and does not actually link to any website.  Finally, the attackers attempt to expedite the attack by claiming that an ‘invoice fee’ will apply if they do not receive a prompt response.

The name of the attached file, “TGL_MSC-20024169(BL DRAFT) .pdf.gz” is also suspicious.  It implies that the attached file is a PDF, or even a compressed (zipped) file containing a PDF. The attachment actually contains a malicious executable file.  When the user opens the malicious file, they would activate PWS:Win32/Fareit!ml malware.  According to TrendMicro, the most common uses for this malware include:

  • Steals stored account information used in different installed File Transfer Protocol (FTP) clients or file manager software
  • Steals stored email credentials of different mail clients
  • Gets stored information such as usernames, passwords, and hostnames from different browsers
  • Performs brute-forcing capabilities on local accounts based on the acquired password list
  • Replicates other Remote Desktop Protocol (RDP) utilities’ mutexes to mask execution in the background, then deletes itself after execution
  • Downloads additional malware payload[2]

Analysts observed another malicious email subject line “MV PRABHU SAKHAWAT” this week.  This vessel name has been used as part of the subject line, for at least five malicious emails, in the past six months.  In the past attackers have used the following sending alias’ to send these malicious emails:

  • Sunnytrans Co., Ltd.
  • Wilhelmsen Ships Service
  • El bahlawan shipping

It is unclear why attackers are using this specific vessel name to target multiple different recipients at different companies.  The attackers appear to be sending unique malware that attempts to exploit CVE-2017-8570 and CVE-2017-11882.  The attached files are either MS Word documents or MS Excel spreadsheets (with macros enabled).

These analytical results illustrate how a recipient could be fooled into opening an infected email.   They also demonstrate how common it is for attackers to specifically target pieces of a company’s supply chain to build up to cyber-attacks on the larger companies.   Doing so could cause the recipient to become an infected member of the maritime supply chain and thus possibly infect victim vessels, port facilities, and/or shore companies in the marine, agricultural, and other industries with additional malware.

Fraudulent emails designed to make recipients hand over sensitive information, extort money or trigger malware installation on shore-based or vessel IT networks remains one of the biggest day-to-day cyber threats facing the maritime industry and associated transportation supply line.   These threats often carry a financial liability to one or all those involved in the maritime transportation supply chain.  Preventative cyber protection offers a strong first-line defense by preventing deceptive messages from ever reaching staff inboxes, but malicious hackers are developing new techniques to evade current detection daily.  

The more convincing an email appears, the greater the chance employees will fall for a scam.   To address this residual risk, software-based protection should be treated as one constituent of a wider strategy that also encompasses the human-element as well as organizational workflows and procedures.

It is imperative to:

  • Train all levels of the marine supply chain to realize they are under constant cyber-attack.
  • Emphasize maintaining constant attention to real-world cyber consequences of careless cyber practices or general inattentiveness.
  • Provide practical guidance on how to identify a potential phishing attempt.
  • Use direct communication to verify emails and supply chain email communication.
  • Use Red Sky Alliance RedXray proactive support, our Vessel impersonation information and use the Maritime Blacklists to proactively block cyber-attacks from identified malicious actors.

 

About Red Sky Alliance

Red Sky Alliance strongly recommends ongoing monitoring from both internal and external perspectives.  Internal monitoring is common practice.  However, external threats are often overlooked and can represent an early warning of impending attacks.   Red Sky Alliance strongly recommends ongoing monitoring from both internal and external perspectives. Internal monitoring is common practice. However, external threats are often overlooked and can represent an early warning of impending attacks. Red Sky Alliance can provide both internal monitorings in tandem with RedXray notifications on external threats to include, including botnet activity, public data breaches, phishing, fraud, and general targeting.

Red Sky Alliance is in New Boston, NH USA. We are a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the lab directly at 1-844-492-7225, or feedback@wapacklabs.com

Link to full Vessel Impersonation report: Weekly 2020 Motor Vessel (MV) & Motor Tanker (MT) Impersonation

[1] https://bazaar.abuse.ch/sample/7704352d7ddb2256b3d47dfa1137263ee59d5f2495bae5db329cf83a401a9ea2/

[2] https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/fareit

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!